logo

CVE-2017-0903 rubygems-update

Package

Manager: gem
Name: rubygems-update
Vulnerable Version: >=2.0.0 <2.6.14

Severity

Level: Critical

CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

EPSS: 0.04901 pctl0.89185

Details

RubyGems vulnerable to Deserialization of Untrusted Data RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution. The issue has been patched in 2.6.14.

Metadata

Created: 2022-05-13T01:38:26Z
Modified: 2023-03-09T00:39:36Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-mqwr-4qf2-2hcv/GHSA-mqwr-4qf2-2hcv.json
CWE IDs: ["CWE-502"]
Alternative ID: GHSA-mqwr-4qf2-2hcv
Finding: F096
Auto approve: 1