6.4 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
0.001 Low
EPSS
Percentile
35.7%
Issue Overview:
There is an OS command injection vulnerability in Ruby Rake < 12.3.3 in Rake::FileList when supplying a filename that begins with the pipe character |
. (CVE-2020-8130)
Affected Packages:
rubygem24-rake
Issue Correction:
Run yum update rubygem24-rake to update your system.
New Packages:
noarch:
rubygem24-rake-doc-12.0.0-1.49.amzn1.noarch
rubygem24-rake-12.0.0-1.49.amzn1.noarch
src:
rubygem24-rake-12.0.0-1.49.amzn1.src
Red Hat: CVE-2020-8130
Mitre: CVE-2020-8130
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Amazon Linux | 1 | noarch | rubygem24-rake-doc | < 12.0.0-1.49.amzn1 | rubygem24-rake-doc-12.0.0-1.49.amzn1.noarch.rpm |
Amazon Linux | 1 | noarch | rubygem24-rake | < 12.0.0-1.49.amzn1 | rubygem24-rake-12.0.0-1.49.amzn1.noarch.rpm |
6.4 Medium
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H
6.9 Medium
CVSS2
Access Vector
LOCAL
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:M/Au:N/C:C/I:C/A:C
0.001 Low
EPSS
Percentile
35.7%