First published: Mon Mar 25 2019(Updated: )
An issue was discovered in RubyGems 2.6 and later through 3.0.2. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rubygems Rubygems | >=2.6.0<=3.0.2 | |
Debian Debian Linux | =9.0 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
rubygems/rubygems-update | >=3.0.0<3.0.2 | 3.0.2 |
rubygems/rubygems-update | >=2.6.0<2.7.9 | 2.7.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-8322 is a vulnerability discovered in RubyGems 2.6 and later versions through 3.0.2, which allows escape sequence injection if a crafted response is provided.
CVE-2019-8322 has a severity rating of 7.5 (high).
RubyGems versions between 2.6 and 3.0.2, Rubygems Rubygems, Debian Linux 9.0, openSUSE Leap 15.0, and openSUSE Leap 15.1 are affected by CVE-2019-8322.
To fix CVE-2019-8322, upgrade to RubyGems version 3.0.2 or ensure you are on a version prior to 2.6.0. For Debian Linux and openSUSE Leap, refer to the provided references for patch information.
You can find more information about CVE-2019-8322 at the following references: [1] [2] [3].