Do your applications use this vulnerable package?
Test your applications
Overview
Affected versions of this package are vulnerable to Information Exposure. An issue was discovered in Ruby 2.5.x through 2.5.7, 2.6.x through 2.6.5, and 2.7.0. If a victim calls BasicSocket#read_nonblock(requested_size, buffer, exception: false), the method resizes the buffer to fit the requested size, but no data is copied. Thus, the buffer string provides the previous value of the heap. This may expose possibly sensitive data from the interpreter.
Remediation
Upgrade ruby
to version or higher.
References
CVSS Score
5.3
medium severity
-
Attack VectorNetwork
-
Attack ComplexityLow
-
Privileges RequiredNone
-
User InteractionNone
-
ScopeUnchanged
-
ConfidentialityLow
-
IntegrityNone
-
AvailabilityNone
- CVE
- CVE-2020-10933
- CWE
- CWE-200
- Snyk ID
- SNYK-ALPINE38-RUBY-598550
- Disclosed
- 04 May, 2020
- Published
- 21 Jul, 2020