CVE-2020-8130

Source
https://cve.org/CVERecord?id=CVE-2020-8130
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-8130.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2020-8130
Aliases
Downstream
Related
Published
2020-02-24T15:15:11.957Z
Modified
2026-01-30T09:39:41.501740Z
Severity
  • 6.4 (Medium) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

There is an OS command injection vulnerability in Ruby Rake < 12.3.3 in Rake::FileList when supplying a filename that begins with the pipe character |.

References

Affected packages

Git / github.com/ruby/rake

Affected ranges

Type
GIT
Repo
https://github.com/ruby/rake
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

rake-0.*
rake-0.7.3
rake-0.8.0
rake-0.8.1
rake-0.8.1.5
rake-0.8.1.6
rake-0.8.1.9
rake-0.8.2
rake-0.8.3
rake-0.8.4
rake-0.8.5
rake-0.8.6
rake-0.8.7
rake-0.9.0
rake-0.9.0.beta.0
rake-0.9.0.beta.1
rake-0.9.0.beta.2
rake-0.9.0.beta.4
rake-0.9.0.beta.5
rake-0.9.1
rake-0.9.2
rake-0.9.3
rake-0.9.3.beta.1
rake-0.9.3.beta.2
rake-0.9.3.beta.3
rake-0.9.4
rake-0.9.5
rake-0.9.6
rake-10.*
rake-10.0.0
rake-10.0.0.beta.2
rake-10.0.1
rake-10.0.2
rake-10.0.3
rake-10.0.4
rake-10.1.0
rake-10.1.0.beta.1
rake-10.1.0.beta.2
rake-10.1.0.beta.3
rake-10.1.1
v0.*
v0.9.2.1
v0.9.2.2
v10.*
v10.2.0
v10.2.1
v10.2.2
v10.3.0
v10.3.1
v10.3.2
v10.4.0
v10.4.1
v10.4.2
v10.5.0
v11.*
v11.0.0
v11.0.1
v11.1.0
v11.1.1
v11.1.2
v11.2.0
v11.2.1
v11.2.2
v11.3.0
v12.*
v12.0.0
v12.0.0.beta1
v12.1.0
v12.2.0
v12.2.1
v12.3.0
v12.3.1
v12.3.2

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2020-8130.json"