Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-8322

Опубликовано: 17 июн. 2019
Источник: debian
EPSS Низкий

Описание

An issue was discovered in RubyGems 2.6 and later through 3.0.2. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ruby2.5fixed2.5.5-1package
ruby2.3removedpackage
ruby2.1removedpackage
rubygemsfixed3.2.0~rc.1-1package
jrubyfixed9.1.17.0-3package

Примечания

  • https://www.ruby-lang.org/en/news/2019/03/05/multiple-vulnerabilities-in-rubygems/

  • https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html

  • https://github.com/rubygems/rubygems/commit/56c0bbb69e4506bda7ef7f447dfec5db820df20b

EPSS

Процентиль: 49%
0.00254
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 6 лет назад

An issue was discovered in RubyGems 2.6 and later through 3.0.2. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur.

CVSS3: 5.3
redhat
больше 6 лет назад

An issue was discovered in RubyGems 2.6 and later through 3.0.2. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur.

CVSS3: 7.5
nvd
около 6 лет назад

An issue was discovered in RubyGems 2.6 and later through 3.0.2. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur.

CVSS3: 7.5
github
почти 6 лет назад

RubyGems Escape sequence injection vulnerability in gem owner

CVSS3: 7.5
fstec
около 6 лет назад

Уязвимость команды gem owner системы управления пакетами RubyGems, связанная с выводом содержимого ответа API в стандартный поток вывода, позволяющая нарушителю нарушить целостность данных

EPSS

Процентиль: 49%
0.00254
Низкий