Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-v222-6mr4-qj29

Опубликовано: 31 мар. 2022
Источник: github
Github: Прошло ревью
CVSS3: 10

Описание

Command Injection vulnerability in asciidoctor-include-ext

Impact

Applications using Asciidoctor (Ruby) with asciidoctor-include-ext (prior to version 0.4.0), which render user-supplied input in AsciiDoc markup, may allow an attacker to execute arbitrary system commands on the host operating system. This attack is possible even when allow-uri-read is disabled! (EDIT: it’s not)

Patches

The vulnerability has been fixed in commit c7ea001 (and further improved in cbaccf3), which is included in version 0.4.0.

Workarounds

require 'asciidoctor/include_ext' class Asciidoctor::IncludeExt::IncludeProcessor # Overrides superclass private method to mitigate Command Injection # vulnerability in asciidoctor-include-ext <0.4.0. def target_uri?(target) target.downcase.start_with?('http://', 'https://') \ && URI.parse(target).is_a?(URI::HTTP) rescue URI::InvalidURIError false end end

References

Credits

This vulnerability was discovered by Joern Schneeweisz from the GitLab Security Research Team.

For more information

See commit message c7ea001.

If you have any questions or comments about this advisory open an issue in jirutka/asciidoctor-include-ext.

Пакеты

Наименование

asciidoctor-include-ext

rubygems
Затронутые версииВерсия исправления

< 0.4.0

0.4.0

EPSS

Процентиль: 80%
0.01383
Низкий

10 Critical

CVSS3

Дефекты

CWE-78

Связанные уязвимости

CVSS3: 10
ubuntu
почти 4 года назад

Asciidoctor-include-ext is Asciidoctor’s standard include processor reimplemented as an extension. Versions prior to 0.4.0, when used to render user-supplied input in AsciiDoc markup, may allow an attacker to execute arbitrary system commands on the host operating system. This attack is possible even when `allow-uri-read` is disabled! The problem has been patched in the referenced commits.

CVSS3: 10
nvd
почти 4 года назад

Asciidoctor-include-ext is Asciidoctor’s standard include processor reimplemented as an extension. Versions prior to 0.4.0, when used to render user-supplied input in AsciiDoc markup, may allow an attacker to execute arbitrary system commands on the host operating system. This attack is possible even when `allow-uri-read` is disabled! The problem has been patched in the referenced commits.

CVSS3: 10
debian
почти 4 года назад

Asciidoctor-include-ext is Asciidoctor\u2019s standard include process ...

EPSS

Процентиль: 80%
0.01383
Низкий

10 Critical

CVSS3

Дефекты

CWE-78