Lucene search

K
gentooGentoo FoundationGLSA-202406-03
HistoryJun 22, 2024 - 12:00 a.m.

RDoc: Remote Code Execution

2024-06-2200:00:00
Gentoo Foundation
security.gentoo.org
1
rdoc
ruby projects
vulnerability
cve
yaml
object injection
remote code execution
documentation cache
upgrade
emerge command.

8.3 High

AI Score

Confidence

Low

0 Low

EPSS

Percentile

0.0%

Background

RDoc produces HTML and command-line documentation for Ruby projects.

Description

A vulnerability has been discovered in RDoc. Please review the CVE identifier referenced below for details.

Impact

When parsing .rdoc_options (used for configuration in RDoc) as a YAML file, object injection and resultant remote code execution are possible because there are no restrictions on the classes that can be restored. When loading the documentation cache, object injection and resultant remote code execution are also possible if there were a crafted cache.

Workaround

There is no known workaround at this time.

Resolution

All RDoc users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-ruby/rdoc-6.6.3.1"
OSVersionArchitecturePackageVersionFilename
Gentooanyalldev-ruby/rdoc< 6.6.3.1UNKNOWN