Описание
JMESPath for Ruby uses unsafe JSON.load when safe JSON.parse is preferable
jmespath.rb (aka JMESPath for Ruby) before 1.6.1 uses JSON.load in a situation where JSON.parse is preferable.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2022-32511
- https://github.com/jmespath/jmespath.rb/pull/55
- https://github.com/jmespath/jmespath.rb/commit/e8841280053a9d9a0c90f36223f926c8b9e4ec49
- https://github.com/jmespath/jmespath.rb/compare/v1.6.0...v1.6.1
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/jmespath/CVE-2022-32511.yml
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/376NUPIPTYBWWGS33GO4UOLQRI4D3BTP
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZ2YWONVFFOPACHAT4MM7ZBT4DNHOF5
- https://stackoverflow.com/a/30050571/580231
Пакеты
Наименование
jmespath
rubygems
Затронутые версииВерсия исправления
< 1.6.1
1.6.1
Связанные уязвимости
CVSS3: 9.8
ubuntu
больше 3 лет назад
jmespath.rb (aka JMESPath for Ruby) before 1.6.1 uses JSON.load in a situation where JSON.parse is preferable.
CVSS3: 9.8
nvd
больше 3 лет назад
jmespath.rb (aka JMESPath for Ruby) before 1.6.1 uses JSON.load in a situation where JSON.parse is preferable.
CVSS3: 9.8
debian
больше 3 лет назад
jmespath.rb (aka JMESPath for Ruby) before 1.6.1 uses JSON.load in a s ...