Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-0903

Опубликовано: 10 окт. 2017
Источник: redhat
CVSS3: 5.6

Описание

RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution.

A vulnerability was found where the rubygems module was vulnerable to an unsafe YAML deserialization when inspecting a gem. Applications inspecting gem files without installing them can be tricked to execute arbitrary code in the context of the ruby interpreter.

Отчет

This issue did not affect the versions of rubygems as shipped with Red Hat Enterprise Linux 6. This issue affects the versions of ruby as shipped with Red Hat Enterprise Linux 7 and the versions of rh-ruby22-ruby and rh-ruby23-ruby as shipped with Red Hat Software Collections. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6rubygemsNot affected
Red Hat Enterprise MRG 2rubygemsNot affected
Red Hat Satellite 6rubygemsNot affected
Red Hat Subscription Asset Managerruby193-rubygemsNot affected
Red Hat Enterprise Linux 7rubyFixedRHSA-2018:037828.02.2018
Red Hat Software Collections for Red Hat Enterprise Linux 6rh-ruby24-rubyFixedRHSA-2017:348519.12.2017
Red Hat Software Collections for Red Hat Enterprise Linux 6rh-ruby22-rubyFixedRHSA-2018:058326.03.2018
Red Hat Software Collections for Red Hat Enterprise Linux 6rh-ruby23-rubyFixedRHSA-2018:058526.03.2018
Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUSrh-ruby24-rubyFixedRHSA-2017:348519.12.2017
Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUSrh-ruby22-rubyFixedRHSA-2018:058326.03.2018

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1500488rubygems: Unsafe object deserialization through YAML formatted gem specifications

5.6 Medium

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 8 лет назад

RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution.

CVSS3: 9.8
nvd
около 8 лет назад

RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution.

CVSS3: 9.8
debian
около 8 лет назад

RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possibl ...

CVSS3: 9.8
github
больше 3 лет назад

RubyGems vulnerable to Deserialization of Untrusted Data

oracle-oval
больше 7 лет назад

ELSA-2018-0378: ruby security update (IMPORTANT)

5.6 Medium

CVSS3