Lucene search

K
gentooGentoo FoundationGLSA-202406-03
HistoryJun 22, 2024 - 12:00 a.m.

RDoc: Remote Code Execution

2024-06-2200:00:00
Gentoo Foundation
security.gentoo.org
6
rdoc
ruby projects
vulnerability
cve
yaml
object injection
remote code execution
documentation cache
upgrade
emerge command.

CVSS3

4.5

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L

AI Score

8.3

Confidence

Low

Background

RDoc produces HTML and command-line documentation for Ruby projects.

Description

A vulnerability has been discovered in RDoc. Please review the CVE identifier referenced below for details.

Impact

When parsing .rdoc_options (used for configuration in RDoc) as a YAML file, object injection and resultant remote code execution are possible because there are no restrictions on the classes that can be restored. When loading the documentation cache, object injection and resultant remote code execution are also possible if there were a crafted cache.

Workaround

There is no known workaround at this time.

Resolution

All RDoc users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=dev-ruby/rdoc-6.6.3.1"
OSVersionArchitecturePackageVersionFilename
Gentooanyalldev-ruby/rdoc< 6.6.3.1UNKNOWN

CVSS3

4.5

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

LOW

CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L

AI Score

8.3

Confidence

Low