CVE-2017-17405

HIGH

Ruby <2.4.3 - Command Injection

Title source: llm

Description

Ruby before 2.4.3 allows Net::FTP command injection. Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file. If the localfile argument starts with the "|" pipe character, the command following the pipe character is executed. The default value of localfile is File.basename(remotefile), so malicious FTP servers could cause arbitrary command execution.

Exploits (1)

exploitdb WORKING POC
by Etienne Stalmans · localruby
https://www.exploit-db.com/exploits/43381

Scores

CVSS v3 8.8
EPSS 0.8865
EPSS Percentile 99.5%
Attack Vector NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Details

CWE
CWE-78
Status published
Products (15)
debian/debian_linux 7.0
debian/debian_linux 8.0
debian/debian_linux 9.0
redhat/enterprise_linux_desktop 7.0
redhat/enterprise_linux_server 7.0
redhat/enterprise_linux_server_aus 7.4
redhat/enterprise_linux_server_aus 7.6
redhat/enterprise_linux_server_eus 7.4
redhat/enterprise_linux_server_eus 7.5
redhat/enterprise_linux_server_eus 7.6
... and 5 more
Published Dec 15, 2017
Tracked Since Feb 18, 2026