Karteek Docsplit vulnerable to OS Command Injection
High severity
GitHub Reviewed
Published
May 17, 2022
to the GitHub Advisory Database
•
Updated Aug 16, 2023
Description
Published by the National Vulnerability Database
Apr 25, 2013
Published to the GitHub Advisory Database
May 17, 2022
Reviewed
Jan 26, 2023
Last updated
Aug 16, 2023
The
extract_from_ocr
function inlib/docsplit/text_extractor.rb
in the Karteek Docsplit (karteek-docsplit) gem 0.5.4 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a PDF filename.References