Lucene search

K
rubygemsRubySecRUBY:RUBY-2019-15845
HistorySep 30, 2019 - 9:00 p.m.

A NUL injection vulnerability of File.fnmatch and File.fnmatch?

2019-09-3021:00:00
RubySec
rubysec.com
31

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Built-in methods File.fnmatch and its alias File.fnmatch? accept the path
pattern as their first parameter. When the pattern contains NUL character
(\0), the methods recognize that the path pattern ends immediately before the
NUL byte. Therefore, a script that uses an external input as the pattern
argument, an attacker can make it wrongly match a pathname that is the second
parameter.

Affected configurations

Vulners
Node
rubyrubyRange2.4.72.5.0
OR
rubyrubyRange2.5.62.6.0
OR
rubyrubyRange2.6.42.7.0
OR
rubyrubyRange2.7.01>
VendorProductVersionCPE
rubyruby*cpe:2.3:a:ruby:ruby:*:*:*:*:*:*:*:*

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N