First published: Mon Mar 25 2019(Updated: )
A Directory Traversal issue was discovered in RubyGems 2.7.6 and later through 3.0.2. Before making new directories or touching files (which now include path-checking code for symlinks), it would delete the target destination. If that destination was hidden behind a symlink, a malicious gem could delete arbitrary files on the user's machine, presuming the attacker could guess at paths. Given how frequently gem is run as sudo, and how predictable paths are on modern systems (/tmp, /usr, etc.), this could likely lead to data loss or an unusable system.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/rubygems-update | >=3.0.0<3.0.3 | 3.0.3 |
rubygems/rubygems-update | >=2.7.6<2.7.9 | 2.7.9 |
Rubygems Rubygems | >=2.7.6<=3.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-8320 is a Directory Traversal vulnerability discovered in RubyGems 2.7.6 through 3.0.2.
CVE-2019-8320 has a severity of 7.4 (High).
CVE-2019-8320 affects RubyGems versions 2.7.6 through 3.0.2.
The remedy for CVE-2019-8320 in RubyGems is to upgrade to version 3.0.3.
You can find more information about CVE-2019-8320 at the following references: [NVD](https://nvd.nist.gov/vuln/detail/CVE-2019-8320), [RubyGems Blog](https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html), [HackerOne Report](https://hackerone.com/reports/317321).