Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mqwr-4qf2-2hcv

Опубликовано: 13 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 9.8

Описание

RubyGems vulnerable to Deserialization of Untrusted Data

RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution. The issue has been patched in 2.6.14.

Пакеты

Наименование

rubygems-update

rubygems
Затронутые версииВерсия исправления

>= 2.0.0, < 2.6.14

2.6.14

EPSS

Процентиль: 89%
0.04623
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 8 лет назад

RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution.

CVSS3: 5.6
redhat
больше 8 лет назад

RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution.

CVSS3: 9.8
nvd
больше 8 лет назад

RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution.

CVSS3: 9.8
debian
больше 8 лет назад

RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possibl ...

oracle-oval
почти 8 лет назад

ELSA-2018-0378: ruby security update (IMPORTANT)

EPSS

Процентиль: 89%
0.04623
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-502