CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
Low
An issue was discovered in StringIO 3.0.1, as distributed in Ruby 3.0.x through 3.0.6 and 3.1.x through 3.1.4.
The ungetbyte
and ungetc
methods on a StringIO can read past the end of a string, and a subsequent call to StringIO.gets
may return the memory value.
This vulnerability is not affected StringIO 3.0.3 and later, and Ruby 3.2.x and later.
We recommend to update the StringIO gem to version 3.0.3 or later. In order to ensure compatibility with bundled version in older Ruby series, you may update as follows instead:
stringio
3.0.1.1stringio
3.1.0.2You can use gem update stringio
to update it. If you are using bundler, please add gem "stringio", ">= 3.0.1.2"
to your Gemfile
.
github.com/advisories/GHSA-v5h6-c2hv-hv3r
github.com/ruby/stringio/commit/0e596524097706263d10900ca180898e4a8f5233
github.com/ruby/stringio/commit/c58c5f54f1eab99665ea6a161d29ff6a7490afc8
github.com/rubysec/ruby-advisory-db/blob/master/gems/stringio/CVE-2024-27280.yml
hackerone.com/reports/1399856
nvd.nist.gov/vuln/detail/CVE-2024-27280
www.ruby-lang.org/en/news/2024/03/21/buffer-overread-cve-2024-27280