Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-1000074

Опубликовано: 15 фев. 2018
Источник: redhat
CVSS3: 7.8
EPSS Низкий

Описание

RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Deserialization of Untrusted Data vulnerability in owner command that can result in code execution. This attack appear to be exploitable via victim must run the gem owner command on a gem with a specially crafted YAML file. This vulnerability appears to have been fixed in 2.7.6.

Отчет

This issue affects the versions of rubygems as shipped with Red Hat Subscription Asset Manager 1.x. Red Hat Product Security has rated this issue as having security impact of Moderate. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/. This issue affects the versions of rubygems as shipped with Red Hat Satellite version 6 on Red Hat Enterprise Linux version 5. Red Hat Product Security has rated this issue as having security impact of Moderate. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6rubygemsWill not fix
Red Hat Enterprise Linux 8rubyNot affected
Red Hat Enterprise MRG 2rubygemsWill not fix
Red Hat Satellite 6rubygemsWill not fix
Red Hat Subscription Asset Managerruby193-rubygemsWill not fix
Red Hat Enterprise Linux 7rubyFixedRHSA-2019:202806.08.2019
Red Hat Enterprise Linux 7.4 Advanced Update SupportrubyFixedRHSA-2020:059125.02.2020
Red Hat Enterprise Linux 7.4 Telco Extended Update SupportrubyFixedRHSA-2020:059125.02.2020
Red Hat Enterprise Linux 7.4 Update Services for SAP SolutionsrubyFixedRHSA-2020:059125.02.2020
Red Hat Enterprise Linux 7.5 Extended Update SupportrubyFixedRHSA-2020:054219.02.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-502
https://bugzilla.redhat.com/show_bug.cgi?id=1547419rubygems: Unsafe Object Deserialization Vulnerability in gem owner allowing arbitrary code execution on specially crafted YAML

EPSS

Процентиль: 67%
0.00535
Низкий

7.8 High

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
почти 8 лет назад

RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Deserialization of Untrusted Data vulnerability in owner command that can result in code execution. This attack appear to be exploitable via victim must run the `gem owner` command on a gem with a specially crafted YAML file. This vulnerability appears to have been fixed in 2.7.6.

CVSS3: 7.8
nvd
почти 8 лет назад

RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Deserialization of Untrusted Data vulnerability in owner command that can result in code execution. This attack appear to be exploitable via victim must run the `gem owner` command on a gem with a specially crafted YAML file. This vulnerability appears to have been fixed in 2.7.6.

CVSS3: 7.8
debian
почти 8 лет назад

RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: ...

CVSS3: 7.8
github
больше 3 лет назад

RubyGems Deserialization of Untrusted Data vulnerability

CVSS3: 7.8
fstec
почти 8 лет назад

Уязвимость компонентов lib/rubygems/commands/owner_command.rb и test/rubygems/test_gem_commands_owner_command.rb системы управления пакетами RubyGems, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 67%
0.00535
Низкий

7.8 High

CVSS3