Arbitrary Code Injection

Affecting ruby package, versions <2.5.5-r0

Report new vulnerabilities
Do your applications use this vulnerable package? Test your applications

Overview

An issue was discovered in RubyGems 2.6 and later through 3.0.2. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur.

References

CVSS Score

7.5
high severity
  • Attack Vector
    Network
  • Attack Complexity
    Low
  • Privileges Required
    None
  • User Interaction
    None
  • Scope
    Unchanged
  • Confidentiality
    None
  • Integrity
    High
  • Availability
    None
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVE
CVE-2019-8322
CWE
CWE-74
Snyk ID
SNYK-ALPINE39-RUBY-449784
Disclosed
17 Jun, 2019
Published
27 Mar, 2019