First published: Wed May 23 2018(Updated: )
Bundler prior to 2.1.0 uses a predictable path in /tmp/, created with insecure permissions as a storage location for gems, if locations under the user's home directory are not available. If Bundler is used in a scenario where the user does not have a writable home directory, an attacker could place malicious code in this directory that would be later loaded and executed.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-ruby26-ruby | <0:2.6.7-119.el7 | 0:2.6.7-119.el7 |
redhat/bundler | <2.1.0 | 2.1.0 |
Bundler | <2.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-3881 has a medium severity due to the potential for unauthorized access to sensitive data.
To fix CVE-2019-3881, upgrade Bundler to version 2.1.0 or later.
CVE-2019-3881 affects Bundler versions prior to 2.1.0 and certain versions of the rh-ruby26-ruby package.
CVE-2019-3881 allows attackers to exploit predictable paths in insecure temporary storage locations, potentially compromising gem integrity.
CVE-2019-3881 is classified as a local vulnerability since it requires local access to the system to exploit.