CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
The files published as part of request_store 1.3.2 have 0666
permissions, meaning that they are world-writable, which allows
local users to execute arbitrary code.
This version was published in 2017, and most production environments
do not allow access for local users, so the chances of this being
exploited are very low, given that the vast majority of users will
have upgraded, and those that have not, if any, are not likely to
be exposed.
I am not aware of any other version of the gem with incorrect
permissions, so simply upgrading should fix the issue.
You could chmod the files yourself, I guess.
Vendor | Product | Version | CPE |
---|---|---|---|
ruby | request_store | * | cpe:2.3:a:ruby:request_store:*:*:*:*:*:*:*:* |