CVE-2017-17405
HIGHRuby <2.4.3 - Command Injection
Title source: llmDescription
Ruby before 2.4.3 allows Net::FTP command injection. Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file. If the localfile argument starts with the "|" pipe character, the command following the pipe character is executed. The default value of localfile is File.basename(remotefile), so malicious FTP servers could cause arbitrary command execution.
Exploits (1)
References (14)
Scores
CVSS v3
8.8
EPSS
0.8865
EPSS Percentile
99.5%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Details
CWE
CWE-78
Status
published
Products (15)
debian/debian_linux
7.0
debian/debian_linux
8.0
debian/debian_linux
9.0
redhat/enterprise_linux_desktop
7.0
redhat/enterprise_linux_server
7.0
redhat/enterprise_linux_server_aus
7.4
redhat/enterprise_linux_server_aus
7.6
redhat/enterprise_linux_server_eus
7.4
redhat/enterprise_linux_server_eus
7.5
redhat/enterprise_linux_server_eus
7.6
... and 5 more
Published
Dec 15, 2017
Tracked Since
Feb 18, 2026