Lucene search

K
rubygemsRubySecRUBY:RUBYGEMS-UPDATE-2019-8324
HistoryMar 04, 2019 - 9:00 p.m.

Installing a malicious gem may lead to arbitrary code execution

2019-03-0421:00:00
RubySec
blog.rubygems.org
13

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

An issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted
gem with a multi-line name is not handled correctly. Therefore, an attacker
could inject arbitrary code to the stub line of gemspec, which is eval-ed by
code in ensure_loadable_spec during the preinstall check.

Affected configurations

Vulners
Node
rubyrubygems-updateRange3.0.3
OR
rubyrubygems-updateRange2.7.02.7.9
VendorProductVersionCPE
rubyrubygems-update*cpe:2.3:a:ruby:rubygems-update:*:*:*:*:*:*:*:*

CVSS2

6.8

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS3

8.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H