Arbitrary Command Execution via Shell Metacharacters in PDF Filename

Arbitrary Command Execution via Shell Metacharacters in PDF Filename

CVE-2013-1933 · HIGH Severity

AV:N/AC:M/AU:N/C:C/I:C/A:C

The extract_from_ocr function in lib/docsplit/text_extractor.rb in the Karteek Docsplit (karteek-docsplit) gem 0.5.4 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a PDF filename.

Learn more about our Web Application Penetration Testing UK.