Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2018-8780

Опубликовано: 28 мар. 2018
Источник: redhat
CVSS3: 6.5
EPSS Низкий

Описание

In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the Dir.open, Dir.new, Dir.entries and Dir.empty? methods do not check NULL characters. When using the corresponding method, unintentional directory traversal may be performed.

It was found that the methods from the Dir class did not properly handle strings containing the NULL byte. An attacker, able to inject NULL bytes in a path, could possibly trigger an unspecified behavior of the ruby script.

Отчет

This issue affects the versions of ruby as shipped with Red Hat CloudForms 4. Red Hat Product Security has rated this issue as having security impact of Moderate. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/. This issue affects the versions of ruby as shipped with Red Hat Subscription Asset Manager 1. Red Hat Product Security has rated this issue as having security impact of Moderate. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.

Меры по смягчению последствий

It is possible to test for presence of the NULL byte manually prior to call a Dir method with an untrusted string.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
CloudForms Management Engine 5rh-ruby22-rubyAffected
CloudForms Management Engine 5ruby-200-rubyAffected
Red Hat Enterprise Linux 5rubyWill not fix
Red Hat Enterprise Linux 6rubyWill not fix
Red Hat Enterprise Linux 8rubyNot affected
Red Hat Software Collectionsrh-ruby22-rubyWill not fix
Red Hat Subscription Asset Managerruby193-rubyWill not fix
Red Hat Enterprise Linux 7rubyFixedRHSA-2019:202806.08.2019
Red Hat Enterprise Linux 7.4 Advanced Update SupportrubyFixedRHSA-2020:059125.02.2020
Red Hat Enterprise Linux 7.4 Telco Extended Update SupportrubyFixedRHSA-2020:059125.02.2020

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-626->CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=1561949ruby: Unintentional directory traversal by poisoned NULL byte in Dir

EPSS

Процентиль: 80%
0.01344
Низкий

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 9.1
ubuntu
почти 8 лет назад

In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the Dir.open, Dir.new, Dir.entries and Dir.empty? methods do not check NULL characters. When using the corresponding method, unintentional directory traversal may be performed.

CVSS3: 9.1
nvd
почти 8 лет назад

In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the Dir.open, Dir.new, Dir.entries and Dir.empty? methods do not check NULL characters. When using the corresponding method, unintentional directory traversal may be performed.

CVSS3: 9.1
debian
почти 8 лет назад

In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x b ...

CVSS3: 9.1
github
больше 3 лет назад

In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the Dir.open, Dir.new, Dir.entries and Dir.empty? methods do not check NULL characters. When using the corresponding method, unintentional directory traversal may be performed.

CVSS3: 6.5
fstec
почти 8 лет назад

Уязвимость методов Dir.open, Dir.new, Dir.entries и Dir.empty интерпретатора языка программирования Ruby, позволяющая нарушителю получить несанкционированный доступ к защищаемым данным или оказать воздействие на целостность защищаемой информации

EPSS

Процентиль: 80%
0.01344
Низкий

6.5 Medium

CVSS3