Lucene search

K
rubygemsRubySecRUBY:RUBY-2017-10784
HistorySep 13, 2017 - 9:00 p.m.

Escape sequence injection vulnerability in the Basic authentication of WEBrick

2017-09-1321:00:00
RubySec
www.ruby-lang.org
19

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

There is an escape sequence injection vulnerability in the Basic
authentication of WEBrick bundled by Ruby.

When using the Basic authentication of WEBrick, clients can pass an
arbitrary string as the user name. WEBrick outputs the passed user name
intact to its log, then an attacker can inject malicious escape sequences to
the log and dangerous control characters may be executed on a victim’s
terminal emulator.

This vulnerability is similar to a vulnerability already fixed, but it had
not been fixed in the Basic authentication.

All users running an affected release should upgrade immediately.

Affected configurations

Vulners
Node
rubyrubyRange2.2.0–2.2.8
OR
rubyrubyRange2.3.0–2.3.5
OR
rubyrubyRange≀2.4.2
VendorProductVersionCPE
rubyruby*cpe:2.3:a:ruby:ruby:*:*:*:*:*:*:*:*

CVSS2

9.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H