Skip to content
This repository was archived by the owner on Aug 22, 2025. It is now read-only.

fixed @ CVE-2020-8130#12

Closed
mik-patient wants to merge 1 commit intopaypal:masterfrom
mik-patient:patch-1
Closed

fixed @ CVE-2020-8130#12
mik-patient wants to merge 1 commit intopaypal:masterfrom
mik-patient:patch-1

Conversation

@mik-patient
Copy link

Descriptions

[Arbitrary Code Injection in rake] Affected versions of this project are vulnerable to Arbitrary Code Injection in Rake::FileList when supplying a filename that begins with the pipe character |.

PoC by Mik Patient

% ls -1 Gemfile Gemfile.lock poc_rake.rb vendor | touch evil.txt % bundle exec ruby poc_rake.rb ["poc_rake.rb", "Gemfile", "Gemfile.lock", "| touch evil.txt", "vendor"] poc_rake.rb:6:list.egrep(/something/) Error while processing 'vendor': Is a directory @ io_fillbuf - fd:7 vendor % ls -1 Gemfile Gemfile.lock evil.txt poc_rake.rb vendor | touch evil.txt

Supporting Refferences:

Impact

An attacker must deploy a file containing command names in the target environment, assuming that this attack is successful. If that would be a serious problem.

@Dani-Kirby Dani-Kirby closed this Aug 22, 2025
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants