First published: Wed Dec 20 2017(Updated: )
Last updated 24 July 2024
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ruby-lang Ruby | >=2.2<=2.2.8 | |
Ruby-lang Ruby | >=2.3<=2.3.5 | |
Ruby-lang Ruby | >=2.4<=2.4.2 | |
Ruby-lang Ruby | =2.5.0-preview1 | |
debian/ruby1.8 | ||
debian/ruby1.9.1 | ||
debian/ruby2.1 | ||
debian/ruby2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-17790 is a vulnerability in the Ruby programming language that allows for Command Injection attacks.
CVE-2017-17790 works by exploiting the lazy_initialize function in lib/resolv.rb in Ruby through version 2.4.3, which uses Kernel#open and can be abused with a Resolv::Hosts::new argument starting with a '|' character.
CVE-2017-17790 has a severity level of low.
Ruby versions up to and including 2.4.3 are affected by CVE-2017-17790.
To fix CVE-2017-17790, update Ruby to version 2.5.1-1 or later.