Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2020-8165

Опубликовано: 18 мая 2020
Источник: redhat
CVSS3: 9.8

Описание

A deserialization of untrusted data vulnernerability exists in rails < 5.2.4.3, rails < 6.0.3.1 that can allow an attacker to unmarshal user-provided objects in MemCacheStore and RedisCacheStore potentially resulting in an RCE.

A flaw was found in rubygem-activesupport. An untrusted user input can be written to the cache store using the raw: true parameter which can lead to the result being evaluated as a marshaled object instead of plain text. The threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Отчет

This issue affects the version of rubygem-activesupport as shipped with Red Hat Gluster Storage 3. However, the 'raw' option is not used by the product when storing untrusted user input and hence this issue has been rated as having a security impact of Low. Red Hat Satellite ship affected RubyGem ActiveSupport and use RedisCacheStore, however, unmarshalling of user-provided objects is handled well in product code hence it is not vulnerable to the flaw. We may update the Ruby on Rails and rails-core dependency in a future release. in OpenShift Container Platform 3.11, rubygem-activesupport is shipped, and it's included in the logging-fluentd container for use by rubygem-kubeclient [1]. The kubeclient gem does NOT make use of the vulnerable class, its only included for the inflector part of activesupport.

Меры по смягчению последствий

Red Hat has investigated whether a possible mitigation exists for this issue, and has not been able to identify a practical example. Please update as soon as possible.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
CloudForms Management Engine 5cfme-amazon-smartstateNot affected
CloudForms Management Engine 5cfme-gemsetWill not fix
Red Hat 3scale API Management Platform 2systemAffected
Red Hat OpenShift Container Platform 3.11rubygem-activesupportFix deferred
Red Hat OpenShift Container Platform 4openshift4/ose-logging-fluentdNot affected
Red Hat Storage 3rubygem-activesupportAffected
Red Hat Satellite 6.9 for RHEL 7ansible-collection-redhat-satelliteFixedRHSA-2021:131321.04.2021
Red Hat Satellite 6.9 for RHEL 7ansiblerole-foreman_scap_clientFixedRHSA-2021:131321.04.2021
Red Hat Satellite 6.9 for RHEL 7ansiblerole-insights-clientFixedRHSA-2021:131321.04.2021
Red Hat Satellite 6.9 for RHEL 7ansiblerole-satellite-receptor-installerFixedRHSA-2021:131321.04.2021

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-20
https://bugzilla.redhat.com/show_bug.cgi?id=1843072rubygem-activesupport: potentially unintended unmarshalling of user-provided objects in MemCacheStore and RedisCacheStore

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 5 лет назад

A deserialization of untrusted data vulnernerability exists in rails < 5.2.4.3, rails < 6.0.3.1 that can allow an attacker to unmarshal user-provided objects in MemCacheStore and RedisCacheStore potentially resulting in an RCE.

CVSS3: 9.8
nvd
около 5 лет назад

A deserialization of untrusted data vulnernerability exists in rails < 5.2.4.3, rails < 6.0.3.1 that can allow an attacker to unmarshal user-provided objects in MemCacheStore and RedisCacheStore potentially resulting in an RCE.

CVSS3: 9.8
debian
около 5 лет назад

A deserialization of untrusted data vulnernerability exists in rails < ...

suse-cvrf
больше 4 лет назад

Security update for rubygem-activesupport-5_1

suse-cvrf
больше 4 лет назад

Security update for rubygem-activesupport-5_1

9.8 Critical

CVSS3