First published: Mon Mar 25 2019(Updated: )
An issue was discovered in RubyGems 2.6 and later through 3.0.2. Gem::GemcutterUtilities#with_response may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/rubygems-update | >=3.0.0<3.0.2 | 3.0.2 |
rubygems/rubygems-update | >=2.6.0<2.7.9 | 2.7.9 |
Rubygems Rubygems | >=2.6.0<=3.0.2 | |
Debian Debian Linux | =9.0 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-8323.
The severity of CVE-2019-8323 is high (7.5).
The affected software includes RubyGems 2.6 through 3.0.2, rubygems-update version 2.6.0 through 2.7.9, Rubygems Rubygems version 2.6.0 through 3.0.2, Debian Debian Linux version 9.0, openSUSE Leap versions 15.0 and 15.1.
CVE-2019-8323 is a vulnerability in RubyGems that allows for escape sequence injection due to the Gem::GemcutterUtilities#with_response method outputting the API response to stdout.
To fix CVE-2019-8323, update to RubyGems version 3.0.2 or use rubygems-update version 2.7.9.