Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-8323

Опубликовано: 17 июн. 2019
Источник: debian
EPSS Низкий

Описание

An issue was discovered in RubyGems 2.6 and later through 3.0.2. Gem::GemcutterUtilities#with_response may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ruby2.5fixed2.5.5-1package
ruby2.3removedpackage
ruby2.1removedpackage
rubygemsfixed3.2.0~rc.1-1package
jrubyfixed9.1.17.0-3package

Примечания

  • https://www.ruby-lang.org/en/news/2019/03/05/multiple-vulnerabilities-in-rubygems/

  • https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html

  • https://github.com/rubygems/rubygems/commit/56c0bbb69e4506bda7ef7f447dfec5db820df20b

EPSS

Процентиль: 49%
0.00254
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 6 лет назад

An issue was discovered in RubyGems 2.6 and later through 3.0.2. Gem::GemcutterUtilities#with_response may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur.

CVSS3: 5.3
redhat
больше 6 лет назад

An issue was discovered in RubyGems 2.6 and later through 3.0.2. Gem::GemcutterUtilities#with_response may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur.

CVSS3: 7.5
nvd
около 6 лет назад

An issue was discovered in RubyGems 2.6 and later through 3.0.2. Gem::GemcutterUtilities#with_response may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur.

CVSS3: 7.5
github
почти 6 лет назад

RubyGems Escape sequence injection vulnerability in api response handling

CVSS3: 7.5
fstec
около 6 лет назад

Уязвимость модуля Gem::GemcutterUtilities системы управления пакетами RubyGems, связанная с выводом содержимого ответа API в стандартный поток вывода, позволяющая нарушителю нарушить целостность данных

EPSS

Процентиль: 49%
0.00254
Низкий