Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mqwr-4qf2-2hcv

Опубликовано: 13 мая 2022
Источник: github
Github: Прошло ревью
CVSS3: 9.8

Описание

RubyGems vulnerable to Deserialization of Untrusted Data

RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution. The issue has been patched in 2.6.14.

Пакеты

Наименование

rubygems-update

rubygems
Затронутые версииВерсия исправления

>= 2.0.0, < 2.6.14

2.6.14

EPSS

Процентиль: 89%
0.04901
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 8 лет назад

RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution.

CVSS3: 5.6
redhat
около 8 лет назад

RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution.

CVSS3: 9.8
nvd
около 8 лет назад

RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution.

CVSS3: 9.8
debian
около 8 лет назад

RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possibl ...

oracle-oval
больше 7 лет назад

ELSA-2018-0378: ruby security update (IMPORTANT)

EPSS

Процентиль: 89%
0.04901
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-502