Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2017-0903

Опубликовано: 11 окт. 2017
Источник: nvd
CVSS3: 9.8
CVSS2: 7.5
EPSS Низкий

Описание

RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:rubygems:rubygems:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.0.0:preview2:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.0.0:preview2.1:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.0.0:preview2.2:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.0.0:rc1:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.0.0:rc2:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.0.7:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.0.8:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.0.9:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.0.10:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.0.11:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.0.12:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.0.13:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.0.14:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.0.15:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.0.16:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.0.17:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.1.0.rc.1:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.1.0.rc.2:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.1.5:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.1.6:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.1.7:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.1.8:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.1.9:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.1.10:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.1.11:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.2.0.preiew.1:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.2.0.rc.1:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.2.5:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.4.2:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.4.3:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.4.4:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.4.5:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.4.6:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.4.7:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.4.8:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.6.2:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.6.3:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.6.4:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.6.5:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.6.6:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.6.7:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.6.8:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.6.9:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.6.10:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.6.11:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.6.12:*:*:*:*:*:*:*
cpe:2.3:a:rubygems:rubygems:2.6.13:*:*:*:*:*:*:*
Конфигурация 2

Одно из

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
Конфигурация 3

Одно из

cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*
Конфигурация 4

Одно из

cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

EPSS

Процентиль: 89%
0.04901
Низкий

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-502
CWE-502

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 8 лет назад

RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution.

CVSS3: 5.6
redhat
около 8 лет назад

RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution.

CVSS3: 9.8
debian
около 8 лет назад

RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possibl ...

CVSS3: 9.8
github
больше 3 лет назад

RubyGems vulnerable to Deserialization of Untrusted Data

oracle-oval
больше 7 лет назад

ELSA-2018-0378: ruby security update (IMPORTANT)

EPSS

Процентиль: 89%
0.04901
Низкий

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-502
CWE-502