{ "schema_version": "1.4.0", "id": "GHSA-rg32-m3hf-772v", "modified": "2023-08-29T15:29:43Z", "published": "2019-07-16T00:41:40Z", "aliases": [ "CVE-2019-1010306" ], "summary": "Slanger Arbitrary command execution", "details": "Slanger 0.6.0 is affected by Remote Code Execution (RCE). The impact is A remote attacker can execute arbitrary commands by sending a crafted request to the server. The component is Message handler & request validator. The attack vector is Remote unauthenticated. The fixed version is after commit 5267b455caeb2e055cccf0d2b6a22727c111f5c3.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" } ], "affected": [ { "package": { "ecosystem": "RubyGems", "name": "slanger" }, "ranges": [ { "type": "ECOSYSTEM", "events": [ { "introduced": "0" }, { "fixed": "0.6.1" } ] } ] } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2019-1010306" }, { "type": "WEB", "url": "https://github.com/stevegraham/slanger/pull/238" }, { "type": "WEB", "url": "https://github.com/stevegraham/slanger/pull/238/commits/5267b455caeb2e055cccf0d2b6a22727c111f5c3" }, { "type": "WEB", "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/slanger/CVE-2019-1010306.yml" }, { "type": "PACKAGE", "url": "https://github.com/stevegraham/slanger" } ], "database_specific": { "cwe_ids": [ "CWE-502" ], "severity": "CRITICAL", "github_reviewed": true, "github_reviewed_at": "2019-07-15T21:51:37Z", "nvd_published_at": "2019-07-15T15:15:00Z" } }