Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2017-17405
Description:Ruby before 2.4.3 allows Net::FTP command injection. Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file. If the localfile argument starts with the "|" pipe character, the command following the pipe character is executed. The default value of localfile is File.basename(remotefile), so malicious FTP servers could cause arbitrary command execution.
Test IDs: 1.3.6.1.4.1.25623.1.0.891421   1.3.6.1.4.1.25623.1.0.843742   1.3.6.1.4.1.25623.1.1.1.2.2017.1221   1.3.6.1.4.1.25623.1.1.13.2017.353.01   1.3.6.1.4.1.25623.1.1.1.2.2017.1222  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2017-17405
BugTraq ID: 102204
http://www.securityfocus.com/bid/102204
Debian Security Information: DSA-4259 (Google Search)
https://www.debian.org/security/2018/dsa-4259
https://www.exploit-db.com/exploits/43381/
https://lists.debian.org/debian-lts-announce/2017/12/msg00025.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00024.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
RedHat Security Advisories: RHSA-2018:0378
https://access.redhat.com/errata/RHSA-2018:0378
RedHat Security Advisories: RHSA-2018:0583
https://access.redhat.com/errata/RHSA-2018:0583
RedHat Security Advisories: RHSA-2018:0584
https://access.redhat.com/errata/RHSA-2018:0584
RedHat Security Advisories: RHSA-2018:0585
https://access.redhat.com/errata/RHSA-2018:0585
RedHat Security Advisories: RHSA-2019:2806
https://access.redhat.com/errata/RHSA-2019:2806
http://www.securitytracker.com/id/1042004




© 1998-2025 E-Soft Inc. All rights reserved.