Huawei EulerOS: Security Advisory for Ruby packag
Reporter | Title | Published | Views | Family All 199 |
---|---|---|---|---|
Tenable Nessus | EulerOS Virtualization 3.0.2.6 : ruby (EulerOS-SA-2023-1056) | 6 Jan 202300:00 | – | nessus |
Tenable Nessus | EulerOS 2.0 SP5 : ruby (EulerOS-SA-2022-1337) | 21 Mar 202200:00 | – | nessus |
Tenable Nessus | EulerOS Virtualization 3.0.6.6 : ruby (EulerOS-SA-2022-2536) | 9 Oct 202200:00 | – | nessus |
Tenable Nessus | EulerOS Virtualization 3.0.2.0 : ruby (EulerOS-SA-2022-1676) | 7 May 202200:00 | – | nessus |
Tenable Nessus | Amazon Linux 2 : ruby (ALAS-2024-2534) | 30 Apr 202400:00 | – | nessus |
Tenable Nessus | EulerOS 2.0 SP3 : ruby (EulerOS-SA-2022-1761) | 26 May 202200:00 | – | nessus |
Tenable Nessus | EulerOS 2.0 SP8 : ruby (EulerOS-SA-2022-1361) | 28 Mar 202200:00 | – | nessus |
Tenable Nessus | EulerOS 2.0 SP9 : ruby (EulerOS-SA-2022-1437) | 18 Apr 202200:00 | – | nessus |
Tenable Nessus | EulerOS 2.0 SP10 : ruby (EulerOS-SA-2022-1515) | 20 Apr 202200:00 | – | nessus |
Tenable Nessus | EulerOS 2.0 SP8 : ruby (EulerOS-SA-2021-2643) | 2 Nov 202100:00 | – | nessus |
Source | Link |
---|---|
developer | www.developer.huaweicloud.com/intl/en-us/euleros/securitydetail.html |
# SPDX-FileCopyrightText: 2022 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.1.2.2022.1337");
script_cve_id("CVE-2021-31810", "CVE-2021-41819");
script_tag(name:"creation_date", value:"2022-03-21 06:41:12 +0000 (Mon, 21 Mar 2022)");
script_version("2024-02-05T14:36:56+0000");
script_tag(name:"last_modification", value:"2024-02-05 14:36:56 +0000 (Mon, 05 Feb 2024)");
script_tag(name:"cvss_base", value:"5.0");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:L/Au:N/C:N/I:P/A:N");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2022-01-12 15:27:27 +0000 (Wed, 12 Jan 2022)");
script_name("Huawei EulerOS: Security Advisory for ruby (EulerOS-SA-2022-1337)");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2022 Greenbone AG");
script_family("Huawei EulerOS Local Security Checks");
script_dependencies("gb_huawei_euleros_consolidation.nasl");
script_mandatory_keys("ssh/login/euleros", "ssh/login/rpms", re:"ssh/login/release=EULEROS\-2\.0SP5");
script_xref(name:"Advisory-ID", value:"EulerOS-SA-2022-1337");
script_xref(name:"URL", value:"https://developer.huaweicloud.com/intl/en-us/euleros/securitydetail.html?secId=EulerOS-SA-2022-1337");
script_tag(name:"summary", value:"The remote host is missing an update for the Huawei EulerOS 'ruby' package(s) announced via the EulerOS-SA-2022-1337 advisory.");
script_tag(name:"vuldetect", value:"Checks if a vulnerable package version is present on the target host.");
script_tag(name:"insight", value:"An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. A malicious FTP server can use the PASV response to trick Net::FTP into connecting back to a given IP address and port. This potentially makes curl extract information about services that are otherwise private and not disclosed (e.g., the attacker can conduct port scans and service banner extractions).(CVE-2021-31810)
CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem through 0.3.0 for Ruby.(CVE-2021-41819)");
script_tag(name:"affected", value:"'ruby' package(s) on Huawei EulerOS V2.0SP5.");
script_tag(name:"solution", value:"Please install the updated package(s).");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"package");
exit(0);
}
include("revisions-lib.inc");
include("pkg-lib-rpm.inc");
release = rpm_get_ssh_release();
if(!release)
exit(0);
res = "";
report = "";
if(release == "EULEROS-2.0SP5") {
if(!isnull(res = isrpmvuln(pkg:"ruby", rpm:"ruby~2.0.0.648~33.h35.eulerosv2r7", rls:"EULEROS-2.0SP5"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"ruby-irb", rpm:"ruby-irb~2.0.0.648~33.h35.eulerosv2r7", rls:"EULEROS-2.0SP5"))) {
report += res;
}
if(!isnull(res = isrpmvuln(pkg:"ruby-libs", rpm:"ruby-libs~2.0.0.648~33.h35.eulerosv2r7", rls:"EULEROS-2.0SP5"))) {
report += res;
}
if(report != "") {
security_message(data:report);
} else if(__pkg_match) {
exit(99);
}
exit(0);
}
exit(0);
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo