Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-17405

Опубликовано: 14 дек. 2017
Источник: redhat
CVSS3: 6.3
EPSS Высокий

Описание

Ruby before 2.4.3 allows Net::FTP command injection. Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file. If the localfile argument starts with the "|" pipe character, the command following the pipe character is executed. The default value of localfile is File.basename(remotefile), so malicious FTP servers could cause arbitrary command execution.

It was discovered that the Net::FTP module did not properly process filenames in combination with certain operations. A remote attacker could exploit this flaw to execute arbitrary commands by setting up a malicious FTP server and tricking a user or Ruby application into downloading files with specially crafted names using the Net::FTP module.

Отчет

This issue affects the versions of ruby as shipped with Red Hat Subscription Asset Manager 1 and CloudForms 5. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
CloudForms Management Engine 5rh-ruby22-rubyAffected
CloudForms Management Engine 5ruby-200-rubyAffected
Red Hat Enterprise Linux 5rubyWill not fix
Red Hat Enterprise Linux 6rubyWill not fix
Red Hat Subscription Asset Managerruby193-rubyAffected
Red Hat Enterprise Linux 7rubyFixedRHSA-2018:037828.02.2018
Red Hat Enterprise Linux 7.3 Advanced Update SupportrubyFixedRHSA-2019:280619.09.2019
Red Hat Enterprise Linux 7.3 Telco Extended Update SupportrubyFixedRHSA-2019:280619.09.2019
Red Hat Enterprise Linux 7.3 Update Services for SAP SolutionsrubyFixedRHSA-2019:280619.09.2019
Red Hat Software Collections for Red Hat Enterprise Linux 6rh-ruby22-rubyFixedRHSA-2018:058326.03.2018

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1526189ruby: Command injection vulnerability in Net::FTP

EPSS

Процентиль: 99%
0.88646
Высокий

6.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 8 лет назад

Ruby before 2.4.3 allows Net::FTP command injection. Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file. If the localfile argument starts with the "|" pipe character, the command following the pipe character is executed. The default value of localfile is File.basename(remotefile), so malicious FTP servers could cause arbitrary command execution.

CVSS3: 8.8
nvd
почти 8 лет назад

Ruby before 2.4.3 allows Net::FTP command injection. Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file. If the localfile argument starts with the "|" pipe character, the command following the pipe character is executed. The default value of localfile is File.basename(remotefile), so malicious FTP servers could cause arbitrary command execution.

CVSS3: 8.8
debian
почти 8 лет назад

Ruby before 2.4.3 allows Net::FTP command injection. Net::FTP#get, get ...

CVSS3: 8.8
github
больше 3 лет назад

Ruby before 2.4.3 allows Net::FTP command injection. Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file. If the localfile argument starts with the "|" pipe character, the command following the pipe character is executed. The default value of localfile is File.basename(remotefile), so malicious FTP servers could cause arbitrary command execution.

CVSS3: 8.8
fstec
почти 8 лет назад

Уязвимость реализации команд Net::FTP интерпретатора языка программирования Ruby, позволяющая нарушителю выполнить произвольные команды

EPSS

Процентиль: 99%
0.88646
Высокий

6.3 Medium

CVSS3