Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2017-17790

Опубликовано: 19 дек. 2017
Источник: redhat
CVSS3: 8.1
EPSS Низкий

Описание

The lazy_initialize function in lib/resolv.rb in Ruby through 2.4.3 uses Kernel#open, which might allow Command Injection attacks, as demonstrated by a Resolv::Hosts::new argument beginning with a '|' character, a different vulnerability than CVE-2017-17405. NOTE: situations with untrusted input may be highly unlikely.

The "lazy_initialize" function in lib/resolv.rb did not properly process certain filenames. A remote attacker could possibly exploit this flaw to inject and execute arbitrary commands.

Отчет

This issue affects the versions of ruby as shipped with Red Hat Enterprise Linux 5, 6 and 7. Red Hat Product Security has rated this issue as having Low security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
CloudForms Management Engine 5rh-ruby22-rubyWill not fix
CloudForms Management Engine 5ruby200-rubyWill not fix
Red Hat Enterprise Linux 5rubyWill not fix
Red Hat Enterprise Linux 6rubyWill not fix
Red Hat Subscription Asset Managerruby193-rubyWill not fix
Red Hat Enterprise Linux 7rubyFixedRHSA-2018:037828.02.2018
Red Hat Software Collections for Red Hat Enterprise Linux 6rh-ruby22-rubyFixedRHSA-2018:058326.03.2018
Red Hat Software Collections for Red Hat Enterprise Linux 6rh-ruby24-rubyFixedRHSA-2018:058426.03.2018
Red Hat Software Collections for Red Hat Enterprise Linux 6rh-ruby23-rubyFixedRHSA-2018:058526.03.2018
Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUSrh-ruby22-rubyFixedRHSA-2018:058326.03.2018

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-77
https://bugzilla.redhat.com/show_bug.cgi?id=1528218ruby: Command injection in lib/resolv.rb:lazy_initialize() allows arbitrary code execution

EPSS

Процентиль: 92%
0.07899
Низкий

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 8 лет назад

The lazy_initialize function in lib/resolv.rb in Ruby through 2.4.3 uses Kernel#open, which might allow Command Injection attacks, as demonstrated by a Resolv::Hosts::new argument beginning with a '|' character, a different vulnerability than CVE-2017-17405. NOTE: situations with untrusted input may be highly unlikely.

CVSS3: 9.8
nvd
почти 8 лет назад

The lazy_initialize function in lib/resolv.rb in Ruby through 2.4.3 uses Kernel#open, which might allow Command Injection attacks, as demonstrated by a Resolv::Hosts::new argument beginning with a '|' character, a different vulnerability than CVE-2017-17405. NOTE: situations with untrusted input may be highly unlikely.

CVSS3: 9.8
debian
почти 8 лет назад

The lazy_initialize function in lib/resolv.rb in Ruby through 2.4.3 us ...

CVSS3: 9.8
github
больше 3 лет назад

The lazy_initialize function in lib/resolv.rb in Ruby through 2.4.3 uses Kernel#open, which might allow Command Injection attacks, as demonstrated by a Resolv::Hosts::new argument beginning with a '|' character, a different vulnerability than CVE-2017-17405. NOTE: situations with untrusted input may be highly unlikely.

CVSS3: 9.8
fstec
почти 8 лет назад

Уязвимость функции lazy_initialize интерпретатора языка программирования Ruby, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 92%
0.07899
Низкий

8.1 High

CVSS3