Deserialization of Untrusted Data

Affecting activesupport gem, versions <5.2.4.3 || >=6.0.0, <6.0.3.1

Report new vulnerabilities
Do your applications use this vulnerable package? Test your applications

Overview

activesupport is a toolkit of support libraries and Ruby core extensions extracted from the Rails framework.

Affected versions of this package are vulnerable to Deserialization of Untrusted Data via the MemCacheStore and RedisCacheStore. when untrusted user input is written to the cache store using the raw: true parameter, re-reading the result from the cache can evaluate the user input as a Marshalled object instead of plain text.

Remediation

Upgrade activesupport to version 5.2.4.3, 6.0.3.1 or higher.

References

CVSS Score

8.1
high severity
  • Attack Vector
    Network
  • Attack Complexity
    High
  • Privileges Required
    None
  • User Interaction
    None
  • Scope
    Unchanged
  • Confidentiality
    High
  • Integrity
    High
  • Availability
    High
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
Credit
Unknown
CVE
CVE-2020-8165
CWE
CWE-502
Snyk ID
SNYK-RUBY-ACTIVESUPPORT-569598
Disclosed
19 May, 2020
Published
19 May, 2020