Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-10663

Опубликовано: 19 мар. 2020
Источник: redhat
CVSS3: 7.3
EPSS Низкий

Описание

The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulnerability. This is quite similar to CVE-2013-0269, but does not rely on poor garbage-collection behavior within Ruby. Specifically, use of JSON parsing methods can lead to creation of a malicious object within the interpreter, with adverse effects that are application-dependent.

A flaw was found in rubygem-json. While parsing certain JSON documents, the json gem (including the one bundled with Ruby) can be coerced into creating arbitrary objects in the target system. This is the same issue as CVE-2013-0269.

Отчет

Red Hat CloudForms 5 uses vulnerable rubygem-json, however, is not vulnerable in Ruby since it does not use version which includes JSON into stdlib. This issue affects the version of JSON(embedded in pcs) as shipped with Red Hat Gluster Storage 3. However, the vulnerable method calls are currently not used by the product and hence this issue has been rated as having a security impact of Low.

Меры по смягчению последствий

To mitigate this vulnerability, do not supply untrusted user input and/or untrusted strings to the following method calls or utilize code libraries which do so:

JSON(user_input) JSON[user_input, nil] JSON.parse(user_input, nil) JSON::Parser.new(user_input).parse

Also note that JSON.load() should never be given input from unknown sources.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
CloudForms Management Engine 5rubyNot affected
CloudForms Management Engine 5rubygem-jsonAffected
Red Hat 3scale API Management Platform 2systemFix deferred
Red Hat Enterprise Linux 5rubyNot affected
Red Hat Enterprise Linux 6rubyNot affected
Red Hat Enterprise Linux 7pcsNot affected
Red Hat Enterprise Linux 7rubyWill not fix
Red Hat Fuse 7jrubyNot affected
Red Hat JBoss A-MQ 6jruby-3977Not affected
Red Hat JBoss A-MQ 6jruby-4198Not affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-20->CWE-94
https://bugzilla.redhat.com/show_bug.cgi?id=1827500rubygem-json: Unsafe object creation vulnerability in JSON

EPSS

Процентиль: 88%
0.04319
Низкий

7.3 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 5 лет назад

The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulnerability. This is quite similar to CVE-2013-0269, but does not rely on poor garbage-collection behavior within Ruby. Specifically, use of JSON parsing methods can lead to creation of a malicious object within the interpreter, with adverse effects that are application-dependent.

CVSS3: 7.5
nvd
больше 5 лет назад

The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulnerability. This is quite similar to CVE-2013-0269, but does not rely on poor garbage-collection behavior within Ruby. Specifically, use of JSON parsing methods can lead to creation of a malicious object within the interpreter, with adverse effects that are application-dependent.

CVSS3: 7.5
debian
больше 5 лет назад

The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9 ...

CVSS3: 7.5
github
около 5 лет назад

Unsafe object creation in json RubyGem

oracle-oval
больше 5 лет назад

ELSA-2020-5724: pcs security update (IMPORTANT)

EPSS

Процентиль: 88%
0.04319
Низкий

7.3 High

CVSS3