
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2013-2513 affects the flash_tool gem through version 0.6.0 for Ruby. The vulnerability was discovered on March 4, 2013, and allows command execution via shell metacharacters in the name of a downloaded file. This vulnerability impacts the file download handling functionality of the flash_tool gem (NVD, GitHub Advisory).
The vulnerability has been assigned a CVSS v3.1 base score of 9.8 (CRITICAL) with the vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The flaw is categorized as CWE-77 (Improper Neutralization of Special Elements used in a Command). The vulnerability is triggered during the handling of downloaded files that contain shell characters, allowing for command injection attacks (NVD, Ruby Advisory).
When exploited, this vulnerability allows an attacker to execute arbitrary commands on the affected system. The CVSS score indicates that successful exploitation can result in a complete compromise of system confidentiality, integrity, and availability (GitHub Advisory).
As of the latest available information, there are no patched versions of the flash_tool gem available. Users should consider using alternative solutions or implementing additional security controls to prevent exploitation (GitHub Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."