Arbitrary Command Execution via Shell Metacharacters in PDF Filename
CVE-2013-1933 · HIGH Severity
AV:N/AC:M/AU:N/C:C/I:C/A:C
The extract_from_ocr function in lib/docsplit/text_extractor.rb in the Karteek Docsplit (karteek-docsplit) gem 0.5.4 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a PDF filename.
Learn more about our Web Application Penetration Testing UK.