High severity vulnerability that affects espeak-ruby
High severity
GitHub Reviewed
Published
Aug 21, 2018
to the GitHub Advisory Database
•
Updated Jan 9, 2023
Withdrawn
This advisory was withdrawn on Jun 17, 2020
Description
Published to the GitHub Advisory Database
Aug 21, 2018
Reviewed
Jun 17, 2020
Withdrawn
Jun 17, 2020
Last updated
Jan 9, 2023
Withdrawn, accidental duplicate publish.
The espeak-ruby gem before 1.0.3 for Ruby allows remote attackers to execute arbitrary commands via shell metacharacters in a string to the speak, save, bytes or bytes_wav method in lib/espeak/speech.rb.
References