First published: Mon Mar 25 2019(Updated: )
An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::UserInteraction#verbose calls say without escaping, escape sequence injection is possible.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/rubygems-update | >=3.0.0<3.0.2 | 3.0.2 |
rubygems/rubygems-update | >=2.6.0<2.7.9 | 2.7.9 |
Rubygems Rubygems | >=2.6.0<=3.0.2 | |
Debian Debian Linux | =9.0 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-8321 is a vulnerability in RubyGems 2.6 and later through 3.0.2 that allows escape sequence injection.
CVE-2019-8321 has a severity rating of 7.5, which is considered high.
RubyGems versions between 2.6 and 3.0.2, as well as rubygems/rubygems-update versions 2.6.0 to 2.7.9 are affected. Additionally, the vulnerability affects Rubygems in general and Debian Linux versions 9.0, openSUSE Leap versions 15.0 and 15.1.
To fix CVE-2019-8321, update RubyGems to version 3.0.2 or rubygems/rubygems-update to version 2.7.9.
More information about CVE-2019-8321 can be found at the following references: [NVD](https://nvd.nist.gov/vuln/detail/CVE-2019-8321), [Debian LTS](https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html), [openSUSE](http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html).