CVE-2013-4318

Published: Dic 26, 2019 Last Modified: Nov 21, 2024 EU-VD ID: EUVD-2022-2268 Aliases: GHSA-42gq-h7xj-33r4
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 5,4
Attack Vector: network
Attack Complexity: low
Privileges Required: low
User Interaction: required
Scope: changed
Confidentiality: low
Integrity: low
Availability: none
LOW 3,5
Access Vector: network
Access Complexity: medium
Authentication: single
Confidentiality: none
Integrity: partial
Availability: none

Description

AI Translation Available

File injection vulnerability in Ruby gem Features 0.3.0 allows remote attackers to inject malicious html in the /tmp directory.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0024
Percentile
0,5th
Updated

EPSS Score Trend (Last 91 Days)

74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Incomplete
Common Consequences
Security Scopes Affected:
Confidentiality Access Control Other Integrity Non-Repudiation
Potential Impacts:
Read Application Data Bypass Protection Mechanism Alter Execution Logic Other Hide Activities
Applicable Platforms
All platforms may be affected
View CWE Details
Application

Feature by Feature Project

cpe:2.3:a:feature_project:feature:0.3.0:*:*:*:*:ruby:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://security-tracker.debian.org/tracker/CVE-2013-4318
http://www.openwall.com/lists/oss-security/2013/09/09/10
Exploit Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2013/09/09/10
https://security-tracker.debian.org/tracker/CVE-2013-4318
http://www.openwall.com/lists/oss-security/2013/09/09/10
Exploit Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2013/09/09/10