Do your applications use this vulnerable package?
Test your applications
Overview
An issue was discovered in RubyGems 2.6 and later through 3.0.2. Gem::GemcutterUtilities#with_response may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur.
References
CVSS Score
7.5
high severity
-
Attack VectorNetwork
-
Attack ComplexityLow
-
Privileges RequiredNone
-
User InteractionNone
-
ScopeUnchanged
-
ConfidentialityNone
-
IntegrityHigh
-
AvailabilityNone
- CVE
- CVE-2019-8323
- CWE
- CWE-74
- Snyk ID
- SNYK-ALPINE38-RUBY-452447
- Disclosed
- 17 Jun, 2019
- Published
- 27 Mar, 2019