Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-16255

Опубликовано: 26 нояб. 2019
Источник: redhat
CVSS3: 8.1
EPSS Низкий

Описание

Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows code injection if the first argument (aka the "command" argument) to Shell#[] or Shell#test in lib/shell.rb is untrusted data. An attacker can exploit this to call an arbitrary Ruby method.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat 3scale API Management Platform 23amp-systemWill not fix
Red Hat Enterprise Linux 5rubyOut of support scope
Red Hat Enterprise Linux 6rubyOut of support scope
Red Hat Enterprise Linux 7rubyWill not fix
Red Hat Software Collectionsrh-ruby24-rubyWill not fix
Red Hat Enterprise Linux 8rubyFixedRHSA-2021:258729.06.2021
Red Hat Enterprise Linux 8rubyFixedRHSA-2021:258829.06.2021
Red Hat Enterprise Linux 8.1 Update Services for SAP SolutionsrubyFixedRHSA-2022:058121.02.2022
Red Hat Enterprise Linux 8.2 Extended Update SupportrubyFixedRHSA-2022:058221.02.2022
Red Hat Software Collections for Red Hat Enterprise Linux 7rh-ruby25-rubyFixedRHSA-2021:210426.05.2021

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-94
https://bugzilla.redhat.com/show_bug.cgi?id=1793683ruby: Code injection via command argument of Shell#test / Shell#[]

EPSS

Процентиль: 81%
0.01584
Низкий

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 8.1
ubuntu
почти 6 лет назад

Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows code injection if the first argument (aka the "command" argument) to Shell#[] or Shell#test in lib/shell.rb is untrusted data. An attacker can exploit this to call an arbitrary Ruby method.

CVSS3: 8.1
nvd
почти 6 лет назад

Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows code injection if the first argument (aka the "command" argument) to Shell#[] or Shell#test in lib/shell.rb is untrusted data. An attacker can exploit this to call an arbitrary Ruby method.

CVSS3: 8.1
msrc
почти 5 лет назад

Описание отсутствует

CVSS3: 8.1
debian
почти 6 лет назад

Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allow ...

CVSS3: 8.1
github
больше 3 лет назад

Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows code injection if the first argument (aka the "command" argument) to Shell#[] or Shell#test in lib/shell.rb is untrusted data. An attacker can exploit this to call an arbitrary Ruby method.

EPSS

Процентиль: 81%
0.01584
Низкий

8.1 High

CVSS3