Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-3881

Опубликовано: 04 сент. 2020
Источник: debian
EPSS Низкий

Описание

Bundler prior to 2.1.0 uses a predictable path in /tmp/, created with insecure permissions as a storage location for gems, if locations under the user's home directory are not available. If Bundler is used in a scenario where the user does not have a writable home directory, an attacker could place malicious code in this directory that would be later loaded and executed.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
bundlerfixed1.16.1-2package
bundlerno-dsastretchpackage
bundlernot-affectedjessiepackage

Примечания

  • Upstream issue: https://github.com/bundler/bundler/issues/6501

  • https://salsa.debian.org/ruby-team/bundler/blob/debian/1.16.1-2/debian/patches/0006-Don-t-use-insecure-temporary-directory-as-home-direc.patch

  • https://salsa.debian.org/ruby-team/bundler/blob/debian/1.16.1-2/debian/patches/0007-Remove-temporary-home-directories.patch

EPSS

Процентиль: 43%
0.00206
Низкий

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 5 лет назад

Bundler prior to 2.1.0 uses a predictable path in /tmp/, created with insecure permissions as a storage location for gems, if locations under the user's home directory are not available. If Bundler is used in a scenario where the user does not have a writable home directory, an attacker could place malicious code in this directory that would be later loaded and executed.

CVSS3: 6.7
redhat
больше 7 лет назад

Bundler prior to 2.1.0 uses a predictable path in /tmp/, created with insecure permissions as a storage location for gems, if locations under the user's home directory are not available. If Bundler is used in a scenario where the user does not have a writable home directory, an attacker could place malicious code in this directory that would be later loaded and executed.

CVSS3: 7.8
nvd
около 5 лет назад

Bundler prior to 2.1.0 uses a predictable path in /tmp/, created with insecure permissions as a storage location for gems, if locations under the user's home directory are not available. If Bundler is used in a scenario where the user does not have a writable home directory, an attacker could place malicious code in this directory that would be later loaded and executed.

suse-cvrf
около 5 лет назад

Security update for rubygem-bundler

suse-cvrf
больше 5 лет назад

Security update for rubygem-bundler

EPSS

Процентиль: 43%
0.00206
Низкий