High severityNVD Advisory· Published Apr 25, 2013· Updated Apr 29, 2026
CVE-2013-1933
CVE-2013-1933
Description
The extract_from_ocr function in lib/docsplit/text_extractor.rb in the Karteek Docsplit (karteek-docsplit) gem 0.5.4 for Ruby allows context-dependent attackers to execute arbitrary commands via shell metacharacters in a PDF filename.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
karteek-docsplitRubyGems | <= 0.5.4 | — |
Affected products
1- cpe:2.3:a:documentcloud:karteek-docsplit:0.5.4:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- github.com/advisories/GHSA-4fvg-pwv7-v54gghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2013-1933ghsaADVISORY
- vapid.dhs.org/advisories/karteek-docsplit-cmd-inject.htmlnvdWEB
- www.openwall.com/lists/oss-security/2013/04/08/15nvdWEB
- exchange.xforce.ibmcloud.com/vulnerabilities/83277nvdWEB
- github.com/rubysec/ruby-advisory-db/blob/master/gems/karteek-docsplit/CVE-2013-1933.ymlghsaWEB
- osvdb.org/92117nvd
News mentions
0No linked articles in our index yet.