Lucene search

K
ubuntucveUbuntu.comUB:CVE-2019-16255
HistoryNov 20, 2019 - 12:00 a.m.

CVE-2019-16255

2019-11-2000:00:00
ubuntu.com
ubuntu.com
116

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.009 Low

EPSS

Percentile

82.0%

Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows
code injection if the first argument (aka the “command” argument) to
Shell#[] or Shell#test in lib/shell.rb is untrusted data. An attacker can
exploit this to call an arbitrary Ruby method.

OSVersionArchitecturePackageVersionFilename
ubuntu18.04noarchjruby< anyUNKNOWN
ubuntu20.04noarchjruby< anyUNKNOWN
ubuntu23.10noarchjruby< anyUNKNOWN
ubuntu14.04noarchjruby< 1.5.6-9+deb8u2build0.14.04.1~esm2) Available with Ubuntu Pro or Ubuntu Pro (Infra-onlyUNKNOWN
ubuntu16.04noarchjruby< anyUNKNOWN
ubuntu16.04noarchruby2.3< 2.3.1-2~ubuntu16.04.14UNKNOWN
ubuntu18.04noarchruby2.5< 2.5.1-1ubuntu1.6UNKNOWN
ubuntu19.04noarchruby2.5< 2.5.5-1ubuntu1.1UNKNOWN
ubuntu19.10noarchruby2.5< 2.5.5-4ubuntu2.1UNKNOWN

8.1 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.009 Low

EPSS

Percentile

82.0%