if the file attachment name contains shell meta characters, commands can be injected and executed remotely. lipsiadmin-5.1.9/lib/data_base/attachment/attach.rb 74 def run(cmd, params = "", expected_outcodes = 0) 75 command = %Q<#{%Q[#{path_for_command(cmd)} #{params}].gsub(/\s+/, " ")}> 76 command = "#{command} 2>#{bit_bucket}" if Attachment.options[:swallow_stderr] 77 output = `#{command}` 78 unless [expected_outcodes].flatten.include?($?.exitstatus) 79 raise AttachmentCommandLineError, "Error while running #{cmd}" 80 end 81 output 82 end