logo

CVE-2019-10842 bootstrap-sass

Package

Manager: gem
Name: bootstrap-sass
Vulnerable Version: =3.2.0.3 || >=3.2.0.3 <3.2.0.4

Severity

Level: Critical

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.11772 pctl0.93458

Details

Bootstrap-sass contains code execution backdoor Arbitrary code execution (via backdoor code) was discovered in bootstrap-sass 3.2.0.3, when downloaded from rubygems.org. An unauthenticated attacker can craft the ___cfduid cookie value with base64 arbitrary code to be executed via eval(), which can be leveraged to execute arbitrary code on the target system. Note that there are three underscore characters in the cookie name. This is unrelated to the __cfduid cookie that is legitimately used by Cloudflare.

Metadata

Created: 2019-04-04T16:28:47Z
Modified: 2023-08-25T23:39:10Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/04/GHSA-vqqv-v9m2-48p2/GHSA-vqqv-v9m2-48p2.json
CWE IDs: ["CWE-94"]
Alternative ID: GHSA-vqqv-v9m2-48p2
Finding: F422
Auto approve: 1