Find, fix and prevent vulnerabilities in your code.
high severity
- Vulnerable module: org.jruby:jruby-stdlib
- Introduced through: org.jruby:jruby@9.4.12.0
Detailed paths
-
Introduced through: adaptris/interlok-jruby@adaptris/interlok-jruby#616c95477ebc47b5cf0386ad3f0b2574d662ecfb › org.jruby:jruby@9.4.12.0 › org.jruby:jruby-stdlib@9.4.12.0Remediation: Upgrade to org.jruby:jruby@9.4.13.0.
Overview
org.jruby:jruby-stdlib is a JRuby Lib Setup package.
Affected versions of this package are vulnerable to Memory Allocation with Excessive Size Value in the ResponseReader class. An attacker can cause the application to allocate excessive memory and trigger a denial of service by including "literal" strings in responses sent to client-initiated connections and IMAP commands.
After implementing the fix, the default max_response_size is still high (512MiB) to accommodate backward compatibility. It is recommended to set a lower max_response_size if connecting to untrusted servers or using insecure connections.
Remediation
A fix was pushed into the master branch but not yet published.
References
high severity
- Module: com.github.jnr:jnr-posix
- Introduced through: org.jruby:jruby@9.4.12.0
Detailed paths
-
Introduced through: adaptris/interlok-jruby@adaptris/interlok-jruby#616c95477ebc47b5cf0386ad3f0b2574d662ecfb › org.jruby:jruby@9.4.12.0 › org.jruby:jruby-base@9.4.12.0 › com.github.jnr:jnr-posix@3.1.20
-
Introduced through: adaptris/interlok-jruby@adaptris/interlok-jruby#616c95477ebc47b5cf0386ad3f0b2574d662ecfb › org.jruby:jruby@9.4.12.0 › org.jruby:jruby-base@9.4.12.0 › com.github.jnr:jnr-unixsocket@0.38.23 › com.github.jnr:jnr-posix@3.1.20
Multiple licenses: EPL-1.0, GPL-2.0, LGPL-2.1
medium severity
- Vulnerable module: org.jruby:jruby
- Introduced through: org.jruby:jruby@9.4.12.0
Detailed paths
-
Introduced through: adaptris/interlok-jruby@adaptris/interlok-jruby#616c95477ebc47b5cf0386ad3f0b2574d662ecfb › org.jruby:jruby@9.4.12.0Remediation: Upgrade to org.jruby:jruby@9.4.12.1.
Overview
org.jruby:jruby is a high performance, stable, fully threaded Java implementation of the Ruby programming language.
Affected versions of this package are vulnerable to Improper Validation of Certificate with Host Mismatch in the SSL certificate validation process. An attacker can intercept secure communications by presenting a valid certificate for an unrelated domain that the attacker controls.
Note:
This is only exploitable if the attacker is in a "man-in-the-middle" (MITM) position before performing the attack.
PoC
require "net/http"
require "openssl"
uri = URI("https://bad.substitutealert.com/")
https = Net::HTTP.new(uri.host, uri.port)
https.use_ssl = true
https.verify_mode = OpenSSL::SSL::VERIFY_PEER
body = https.start { https.get(uri.request_uri).body }
puts body
Remediation
Upgrade org.jruby:jruby to version 9.4.12.1, 10.0.0.1 or higher.
References
medium severity
- Module: org.jruby:dirgra
- Introduced through: org.jruby:jruby@9.4.12.0
Detailed paths
-
Introduced through: adaptris/interlok-jruby@adaptris/interlok-jruby#616c95477ebc47b5cf0386ad3f0b2574d662ecfb › org.jruby:jruby@9.4.12.0 › org.jruby:jruby-base@9.4.12.0 › org.jruby:dirgra@0.3
EPL-1.0 license