First published: Mon Mar 25 2019(Updated: )
An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::CommandManager#run calls alert_error without escaping, escape sequence injection is possible. (There are many ways to cause an error.)
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/rubygems-update | >=3.0.0<3.0.2 | 3.0.2 |
rubygems/rubygems-update | >=2.6.0<2.7.9 | 2.7.9 |
Rubygems Rubygems | >=2.6.0<=3.0.2 | |
openSUSE Leap | =15.0 | |
openSUSE Leap | =15.1 | |
Debian Debian Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-8325 is high, with a CVSS score of 7.5.
CVE-2019-8325 affects RubyGems version 2.6 and later through 3.0.2.
The remediation for CVE-2019-8325 in RubyGems is to update to version 3.0.2 or higher.
CVE-2019-8325 affects openSUSE Leap 15.0 and 15.1, as well as Debian Linux 9.0.
You can find more information about CVE-2019-8325 at the following references: [NVD](https://nvd.nist.gov/vuln/detail/CVE-2019-8325), [Debian LTS Announce](https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html), [openSUSE Security Announce](http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html).