6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.022 Low
EPSS
Percentile
89.4%
RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6
and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and
earlier, prior to trunk revision 62422 contains a Deserialization of
Untrusted Data vulnerability in owner command that can result in code
execution. This attack appear to be exploitable via victim must run the
gem owner
command on a gem with a specially crafted YAML file. This
vulnerability appears to have been fixed in 2.7.6.
Author | Note |
---|---|
tyhicks | ruby{1.9.1,2.0,2.3} and jruby ship an embedded rubygems. |
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 18.04 | noarch | jruby | < any | UNKNOWN |
ubuntu | 14.04 | noarch | jruby | < 1.5.6-9+deb8u2build0.14.04.1~esm2 | UNKNOWN |
ubuntu | 16.04 | noarch | jruby | < any | UNKNOWN |
ubuntu | 14.04 | noarch | ruby1.9.1 | < 1.9.3.484-2ubuntu1.12 | UNKNOWN |
ubuntu | 14.04 | noarch | ruby2.0 | < 2.0.0.484-1ubuntu2.10 | UNKNOWN |
ubuntu | 17.10 | noarch | ruby2.3 | < 2.3.3-1ubuntu1.4 | UNKNOWN |
ubuntu | 16.04 | noarch | ruby2.3 | < 2.3.1-2~16.04.7 | UNKNOWN |
ubuntu | 18.04 | noarch | ruby2.5 | < 2.5.1-1 | UNKNOWN |
ubuntu | 18.10 | noarch | ruby2.5 | < 2.5.1-1 | UNKNOWN |
ubuntu | 19.04 | noarch | ruby2.5 | < 2.5.1-1 | UNKNOWN |
github.com/rubygems/rubygems/commit/254e3d0ee873c008c0b74e8b8abcbdab4caa0a6d
launchpad.net/bugs/cve/CVE-2018-1000074
nvd.nist.gov/vuln/detail/CVE-2018-1000074
security-tracker.debian.org/tracker/CVE-2018-1000074
ubuntu.com/security/notices/USN-3621-1
ubuntu.com/security/notices/USN-3621-2
ubuntu.com/security/notices/USN-3685-1
www.cve.org/CVERecord?id=CVE-2018-1000074
www.ruby-lang.org/en/news/2018/02/17/multiple-vulnerabilities-in-rubygems/
6.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
REQUIRED
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
0.022 Low
EPSS
Percentile
89.4%