9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.135 Low
EPSS
Percentile
95.6%
RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible
remote code execution vulnerability. YAML deserialization of gem
specifications can bypass class white lists. Specially crafted serialized
objects can possibly be used to escalate to remote code execution.
Author | Note |
---|---|
tyhicks | ruby{1.9.1,2.0,2.3} and jruby ship an embedded rubygems. |
leosilva | following http://www.openwall.com/lists/oss-security/2017/10/10/2, versions < 2.0.0 of ruby are not affected |
blog.rubygems.org/2017/10/09/2.6.14-released.html
blog.rubygems.org/2017/10/09/unsafe-object-deserialization-vulnerability.html
github.com/rubygems/rubygems/commit/510b1638ac9bba3ceb7a5d73135dafff9e5bab49
hackerone.com/reports/274990
launchpad.net/bugs/cve/CVE-2017-0903
nvd.nist.gov/vuln/detail/CVE-2017-0903
security-tracker.debian.org/tracker/CVE-2017-0903
ubuntu.com/security/notices/USN-3553-1
ubuntu.com/security/notices/USN-3685-1
ubuntu.com/security/notices/USN-3685-2
www.cve.org/CVERecord?id=CVE-2017-0903
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.5 High
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.135 Low
EPSS
Percentile
95.6%