Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xfhh-rx56-rxcr

Опубликовано: 02 июл. 2019
Источник: github
Github: Прошло ревью
CVSS3: 7.5

Описание

Path Traversal vulnerability that affects yard

Possible arbitrary path traversal and file access via yard server

Impact

A path traversal vulnerability was discovered in YARD <= 0.9.19 when using yard server to serve documentation. This bug would allow unsanitized HTTP requests to access arbitrary files on the machine of a yard server host under certain conditions.

Thanks to CuongMX from Viettel Cyber Security for discovering this vulnerability.

Patches

Please upgrade to YARD v0.9.20 immediately if you are relying on yard server to host documentation in any untrusted environments.

Workarounds

For users who cannot upgrade, it is possible to perform path sanitization of HTTP requests at your webserver level. WEBrick, for example, can perform such sanitization by default (which you can use via yard server -s webrick), as can certain rules in your webserver configuration.

Пакеты

Наименование

yard

rubygems
Затронутые версииВерсия исправления

< 0.9.20

0.9.20

EPSS

Процентиль: 48%
0.00246
Низкий

7.5 High

CVSS3

Дефекты

CWE-22

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 6 лет назад

yard before 0.9.20 allows path traversal.

CVSS3: 8.8
redhat
больше 6 лет назад

yard before 0.9.20 allows path traversal.

CVSS3: 7.5
nvd
больше 6 лет назад

yard before 0.9.20 allows path traversal.

CVSS3: 7.5
debian
больше 6 лет назад

yard before 0.9.20 allows path traversal.

EPSS

Процентиль: 48%
0.00246
Низкий

7.5 High

CVSS3

Дефекты

CWE-22