8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.003 Low
EPSS
Percentile
67.8%
An issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted
gem with a multi-line name is not handled correctly. Therefore, an attacker
could inject arbitrary code to the stub line of gemspec, which is eval-ed
by code in ensure_loadable_spec during the preinstall check.
Author | Note |
---|---|
tyhicks | ruby{1.9.1,2.0,2.3} and jruby ship an embedded rubygems. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | jruby | < any | UNKNOWN |
ubuntu | 14.04 | noarch | jruby | < 1.5.6-9+deb8u2build0.14.04.1~esm2) Available with Ubuntu Pro or Ubuntu Pro (Infra-only | UNKNOWN |
ubuntu | 14.04 | noarch | ruby1.9.1 | < 1.9.3.484-2ubuntu1.14 | UNKNOWN |
ubuntu | 14.04 | noarch | ruby2.0 | < 2.0.0.484-1ubuntu2.13 | UNKNOWN |
ubuntu | 16.04 | noarch | ruby2.3 | < 2.3.1-2~16.04.12 | UNKNOWN |
ubuntu | 18.04 | noarch | ruby2.5 | < 2.5.1-1ubuntu1.2 | UNKNOWN |
ubuntu | 18.10 | noarch | ruby2.5 | < 2.5.1-5ubuntu4.3 | UNKNOWN |
ubuntu | 19.04 | noarch | ruby2.5 | < 2.5.5-1 | UNKNOWN |
ubuntu | 19.10 | noarch | ruby2.5 | < 2.5.5-1 | UNKNOWN |
blog.rubygems.org/2019/03/05/security-advisories-2019-03.html
bugs.ruby-lang.org/attachments/7669 (for 2.4.5)
bugs.ruby-lang.org/attachments/7670 (for 2.5.3)
launchpad.net/bugs/cve/CVE-2019-8324
nvd.nist.gov/vuln/detail/CVE-2019-8324
security-tracker.debian.org/tracker/CVE-2019-8324
ubuntu.com/security/notices/USN-3945-1
www.cve.org/CVERecord?id=CVE-2019-8324
www.ruby-lang.org/en/news/2019/03/05/multiple-vulnerabilities-in-rubygems/
8.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
6.8 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
0.003 Low
EPSS
Percentile
67.8%