Arbitrary Command Injection Affecting festivaltts4r package, versions >=0.0.0


0.0
critical

Snyk CVSS

    Attack Complexity Low
    Confidentiality High
    Integrity High
    Availability High

    Threat Intelligence

    EPSS 0.38% (73rd percentile)
Expand this section
NVD
9.8 critical

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk ID SNYK-RUBY-FESTIVALTTS4R-20358
  • published 3 Apr 2017
  • disclosed 21 Apr 2016
  • credit Brendan Coles

How to fix?

There is no fix version for festivaltts4r.

Overview

festivaltts4r is a Text-to-speech for Ruby using festivaltts.

Affected versions of the package are vulnerable to Arbitrary Command Injection. User input is passed as an argument in the to_speech and to_mp3 methods, allowing a malicious user to run arbitrary code or see environment variables.