Lucene search

K
rubygemsRubySecRUBY:RUBYGEMS-UPDATE-2017-0901
HistoryAug 28, 2017 - 9:00 p.m.

RubyGems vulnerability in the gem installer that allowed a malicious gem to overwrite arbitrary files

2017-08-2821:00:00
RubySec
blog.rubygems.org
12

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

RubyGems version 2.6.12 and earlier fails to validate specification names,
allowing a maliciously crafted gem to potentially overwrite any file on the
filesystem.

Affected configurations

Vulners
Node
rubyrubygems-updateRange2.4.5.3
OR
rubyrubygems-updateRange2.5.2.1
OR
rubyrubygems-updateRange2.6.13
VendorProductVersionCPE
rubyrubygems-update*cpe:2.3:a:ruby:rubygems-update:*:*:*:*:*:*:*:*

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N