First published: Wed Feb 21 2018(Updated: )
Cross-site scripting vulnerability in homepage attribute when displayed via gem server was found. Upstream fix: <a href="https://github.com/rubygems/rubygems/commit/66a28b9275551384fdab45f3591a82d6b59952cb">https://github.com/rubygems/rubygems/commit/66a28b9275551384fdab45f3591a82d6b59952cb</a> External References: <a href="https://www.ruby-lang.org/en/news/2018/02/17/multiple-vulnerabilities-in-rubygems/">https://www.ruby-lang.org/en/news/2018/02/17/multiple-vulnerabilities-in-rubygems/</a>
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rubygems Rubygems | <=2.2.9 | |
Rubygems Rubygems | <=2.3.6 | |
Rubygems Rubygems | <=2.4.3 | |
Rubygems Rubygems | <=2.5.0 | |
Debian Debian Linux | =7.0 | |
redhat/rubygems | <2.7.6 | 2.7.6 |
debian/jruby | 9.3.9.0+ds-8 9.4.8.0+ds-1 | |
debian/rubygems | 3.2.5-2 3.3.15-2 3.4.20-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-1000078 is medium with a severity value of 4.
CVE-2018-1000078 affects RubyGems versions Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier.
For Ubuntu, the remedy is to update to Ruby 2.3.3-1ubuntu1.4 or 2.3.1-2~16.04.7. For Debian, the remedy is to update to JRuby 9.1.17.0-3 or Ruby 2.5.5-3+deb10u4. For Red Hat, the remedy is to update to RubyGems 2.7.6.
You can find more information about CVE-2018-1000078 at the following references: [1](http://blog.rubygems.org/2018/02/15/2.7.6-released.html), [2](https://github.com/rubygems/rubygems/commit/66a28b9275551384fdab45f3591a82d6b59952cb), [3](https://lists.debian.org/debian-lts-announce/2018/04/msg00000.html).
The Common Weakness Enumeration (CWE) for CVE-2018-1000078 is CWE-79.