Skip to content

Commit d7a18c7

Browse files
QuintusJuanitoFatas
authored andcommitted
Fix spelling of Shell#test (en)
1 parent b74c7e8 commit d7a18c7

File tree

1 file changed

+2
-1
lines changed

1 file changed

+2
-1
lines changed

en/news/_posts/2019-10-01-code-injection-shell-test-cve-2019-16255.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ A code injection vulnerability of Shell#[] and Shell#test in a standard library
1414

1515
Shell#[] and its alias Shell#test defined in lib/shell.rb allow code injection if the first argument (aka the "command" argument) is untrusted data. An attacker can exploit this to call an arbitrary Ruby method.
1616

17-
Note that passing untrusted data to methods of Shell is dangerous in general. Users must never do it. However, we treat this particular case as a vulnerability because the purpose of Shell#[] and Shell#[] is considered file testing.
17+
Note that passing untrusted data to methods of Shell is dangerous in general. Users must never do it. However, we treat this particular case as a vulnerability because the purpose of Shell#[] and Shell#test is considered file testing.
1818

1919
All users running an affected release should upgrade immediately.
2020

@@ -33,3 +33,4 @@ Thanks to [ooooooo_q](https://hackerone.com/ooooooo_q) for discovering this issu
3333
## History
3434

3535
* Originally published at 2019-10-01 11:00:00 (UTC)
36+
* Fixed minor spelling problem at 2019-10-05 12:00:00 (UTC)

0 commit comments

Comments
 (0)