Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-36327

Опубликовано: 29 апр. 2021
Источник: debian
EPSS Средний

Описание

Bundler 1.16.0 through 2.2.9 and 2.2.11 through 2.2.16 sometimes chooses a dependency source based on the highest gem version number, which means that a rogue gem found at a public source may be chosen, even if the intended choice was a private gem that is a dependency of another private gem that is explicitly depended on by the application. NOTE: it is not correct to use CVE-2021-24105 for every "Dependency Confusion" issue in every product.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
bundlerremovedpackage
bundlerno-dsabusterpackage
bundlerno-dsastretchpackage
rubygemsfixed3.3.5-1package
rubygemsignoredbullseyepackage

Примечания

  • https://github.com/rubygems/rubygems/issues/3982

  • https://github.com/rubygems/rubygems/pull/4609

EPSS

Процентиль: 93%
0.12083
Средний

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 4 лет назад

Bundler 1.16.0 through 2.2.9 and 2.2.11 through 2.2.16 sometimes chooses a dependency source based on the highest gem version number, which means that a rogue gem found at a public source may be chosen, even if the intended choice was a private gem that is a dependency of another private gem that is explicitly depended on by the application. NOTE: it is not correct to use CVE-2021-24105 for every "Dependency Confusion" issue in every product.

CVSS3: 8.8
redhat
больше 4 лет назад

Bundler 1.16.0 through 2.2.9 and 2.2.11 through 2.2.16 sometimes chooses a dependency source based on the highest gem version number, which means that a rogue gem found at a public source may be chosen, even if the intended choice was a private gem that is a dependency of another private gem that is explicitly depended on by the application. NOTE: it is not correct to use CVE-2021-24105 for every "Dependency Confusion" issue in every product.

CVSS3: 8.8
nvd
около 4 лет назад

Bundler 1.16.0 through 2.2.9 and 2.2.11 through 2.2.16 sometimes chooses a dependency source based on the highest gem version number, which means that a rogue gem found at a public source may be chosen, even if the intended choice was a private gem that is a dependency of another private gem that is explicitly depended on by the application. NOTE: it is not correct to use CVE-2021-24105 for every "Dependency Confusion" issue in every product.

suse-cvrf
2 месяца назад

Security update for rubygem-bundler

rocky
больше 3 лет назад

Important: ruby:2.5 security update

EPSS

Процентиль: 93%
0.12083
Средний