Lucene search

K
rubygemsRubySecRUBY:RUBYGEMS-UPDATE-2018-1000079
HistoryMay 13, 2022 - 9:00 p.m.

RubyGems Path Traversal vulnerability

2022-05-1321:00:00
RubySec
github.com
5
rubygems
path traversal
vulnerability
ruby 2.x
directory traversal
installation
malicious gem
filesystem

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series:
2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and
earlier, prior to trunk revision 62422 contains a Directory Traversal vulnerability
in gem installation that can result in the gem writing to arbitrary filesystem locations
during installation. This attack appears to be exploitable via installation of a
malicious gem. This vulnerability is fixed in 2.7.6.

Affected configurations

Vulners
Node
rubyrubygems-updateRange2.7.6
VendorProductVersionCPE
rubyrubygems-update*cpe:2.3:a:ruby:rubygems-update:*:*:*:*:*:*:*:*

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS3

5.5

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N