Lucene search

K
prionPRIOn knowledge basePRION:CVE-2017-17405
HistoryDec 15, 2017 - 9:29 a.m.

Command injection

2017-12-1509:29:00
PRIOn knowledge base
www.prio-n.com
42

9.1 High

AI Score

Confidence

High

0.895 High

EPSS

Percentile

98.8%

Ruby before 2.4.3 allows Net::FTP command injection. Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file. If the localfile argument starts with the “|” pipe character, the command following the pipe character is executed. The default value of localfile is File.basename(remotefile), so malicious FTP servers could cause arbitrary command execution.