Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-0903

Опубликовано: 11 окт. 2017
Источник: debian

Описание

RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ruby2.3fixed2.3.5-1package
ruby2.1removedpackage
ruby1.9.1removedpackage
ruby1.9.1not-affectedwheezypackage
rubygemsfixed3.2.0~rc.1-1package
rubygemsnot-affectedwheezypackage

Примечания

  • https://www.openwall.com/lists/oss-security/2017/10/10/2

  • https://justi.cz/security/2017/10/07/rubygems-org-rce.html

  • Fixed by: https://github.com/rubygems/rubygems/commit/510b1638ac9bba3ceb7a5d73135dafff9e5bab49

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 8 лет назад

RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution.

CVSS3: 5.6
redhat
больше 8 лет назад

RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution.

CVSS3: 9.8
nvd
больше 8 лет назад

RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution.

CVSS3: 9.8
github
больше 3 лет назад

RubyGems vulnerable to Deserialization of Untrusted Data

oracle-oval
почти 8 лет назад

ELSA-2018-0378: ruby security update (IMPORTANT)