First published: Thu Mar 29 2018(Updated: )
Dir.mktmpdir method introduced by tmpdir library accepts the prefix and the suffix of the directory which is created as the first parameter. The prefix can contain relative directory specifiers "../", so this method can be used to target any directory. So, if a script accepts an external input as the prefix, and the targeted directory has inappropriate permissions or the ruby process has inappropriate privileges, the attacker can create a directory or a file at any directory. Affected versions: Ruby 2.2 series: 2.2.9 and earlier Ruby 2.3 series: 2.3.6 and earlier Ruby 2.4 series: 2.4.3 and earlier Ruby 2.5 series: 2.5.0 and earlier External References: <a href="https://www.ruby-lang.org/en/news/2018/03/28/unintentional-file-and-directory-creation-with-directory-traversal-cve-2018-6914/">https://www.ruby-lang.org/en/news/2018/03/28/unintentional-file-and-directory-creation-with-directory-traversal-cve-2018-6914/</a>
Credit: CVE-2017-0898 CVE-2017-10784 CVE-2017-14033 CVE-2017-14064 CVE-2017-17405 CVE-2017-17742 CVE-2018-6914 CVE-2018-8777 CVE-2018-8778 CVE-2018-8779 CVE-2018-8780 cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ruby-lang Ruby | >=2.2.0<2.2.10 | |
Ruby-lang Ruby | >=2.3.0<2.3.7 | |
Ruby-lang Ruby | >=2.4.0<2.4.4 | |
Ruby-lang Ruby | >=2.5.0<2.5.1 | |
Ruby-lang Ruby | =2.6.0-preview1 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =16.04 | |
Canonical Ubuntu Linux | =17.10 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Redhat Enterprise Linux | =6.0 | |
Redhat Enterprise Linux | =7.0 | |
Redhat Enterprise Linux | =7.4 | |
Redhat Enterprise Linux | =7.5 | |
Redhat Enterprise Linux | =7.6 | |
Apple macOS Mojave | <10.14.1 | 10.14.1 |
Apple High Sierra | ||
Apple Sierra | ||
Apple macOS High Sierra | <10.13.6 | 10.13.6 |
Apple El Capitan | ||
redhat/ruby | <2.2.10 | 2.2.10 |
redhat/ruby | <2.3.7 | 2.3.7 |
redhat/ruby | <2.4.4 | 2.4.4 |
redhat/ruby | <2.5.1 | 2.5.1 |
debian/ruby1.8 | ||
debian/ruby1.9.1 | ||
debian/ruby2.1 | ||
debian/ruby2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
The vulnerability ID is CVE-2018-6914.
The severity of CVE-2018-6914 is high with a severity value of 7.5.
CVE-2018-6914 is a directory traversal vulnerability in the Dir.mktmpdir method in the tmpdir library in Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1 that might allow attackers to create arbitrary directories or files via a .. (dot dot) in the prefix argument.
To fix CVE-2018-6914, upgrade Ruby to version 2.2.10, 2.3.7, 2.4.4, 2.5.1, or 2.6.0-preview1.
You can find more information about CVE-2018-6914 at the following references: [link1], [link2], [link3].