CVE-2021-31799

Source
https://nvd.nist.gov/vuln/detail/CVE-2021-31799
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2021-31799.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2021-31799
Aliases
Downstream
Related
Published
2021-07-30T14:15:16Z
Modified
2025-10-08T04:37:48.034002Z
Severity
  • 7.0 (High) CVSS_V3 - CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby through 3.0.1, it is possible to execute arbitrary code via | and tags in a filename.

References

Affected packages

Git / github.com/ruby/rdoc

Affected ranges

Type
GIT
Repo
https://github.com/ruby/rdoc
Events

Affected versions

v3.*

v3.11
v3.12

v4.*

v4.0.0
v4.0.0.preview2
v4.0.0.preview2.1
v4.0.0.rc.2
v4.0.0.rc.2.1
v4.0.1
v4.1.0
v4.1.0.preview.1
v4.1.0.preview.3
v4.1.1
v4.2.0
v4.2.1
v4.2.2
v4.3.0

v5.*

v5.0.0
v5.0.0.beta1
v5.0.0.beta2
v5.1.0

v6.*

v6.0.0
v6.0.0.beta1
v6.0.0.beta2
v6.0.0.beta3
v6.0.0.beta4
v6.0.1
v6.0.2
v6.0.3
v6.0.4
v6.1.0
v6.1.0.beta1
v6.1.0.beta2
v6.1.0.beta3
v6.1.1
v6.2.0
v6.2.1
v6.3.0