Lucene search

K
rubygemsRubySecRUBY:RUBY-2018-8779
HistoryMar 27, 2018 - 9:00 p.m.

Unintentional socket creation by poisoned NUL byte in UNIXServer and UNIXSocket

2018-03-2721:00:00
RubySec
www.ruby-lang.org
15

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

There is a unintentional socket creation vulnerability in UNIXServer.open
method of socket library bundled with Ruby. And there is also a unintentional
socket access vulnerability in UNIXSocket.open method.

UNIXServer.open accepts the path of the socket to be created at the first
parameter. If the path contains NUL (\0) bytes, this method recognize that
the path is completed before the NUL bytes. So, if a script accepts an external
input as the argument of this method, the attacker can make the socket file in
the unintentional path. And, UNIXSocket.open also accepts the path of the
socket to be created at the first parameter without checking NUL bytes like
UNIXServer.open. So, if a script accepts an external input as the argument of
this method, the attacker can accepts the socket file in the unintentional
path.

All users running an affected release should upgrade immediately.

Affected configurations

Vulners
Node
rubyrubyRange2.2.02.2.10
OR
rubyrubyRange2.3.02.3.7
OR
rubyrubyRange2.4.02.4.4
OR
rubyrubyRange2.5.02.5.1
OR
rubyrubyRange2.6.01
VendorProductVersionCPE
rubyruby*cpe:2.3:a:ruby:ruby:*:*:*:*:*:*:*:*

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N