First published: Thu Mar 19 2020(Updated: )
A flaw was found in rubygem-json. While parsing certain JSON documents, the json gem (including the one bundled with Ruby) can be coerced into creating arbitrary objects in the target system. This is the same issue as CVE-2013-0269.
Credit: Jeremy Evans cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/json | <2.3.0 | 2.3.0 |
redhat/pcs | <0:0.10.4-6.el8_2.1 | 0:0.10.4-6.el8_2.1 |
redhat/pcs | <0:0.10.1-4.el8_0.5 | 0:0.10.1-4.el8_0.5 |
redhat/pcs | <0:0.10.2-4.el8_1.1 | 0:0.10.2-4.el8_1.1 |
redhat/rh-ruby25-ruby | <0:2.5.9-9.el7 | 0:2.5.9-9.el7 |
redhat/rh-ruby26-ruby | <0:2.6.7-119.el7 | 0:2.6.7-119.el7 |
debian/ruby-json | 2.1.0+dfsg-2+deb10u1 2.3.0+dfsg-1 2.6.3+dfsg-1 | |
debian/ruby2.5 | 2.5.5-3+deb10u4 2.5.5-3+deb10u6 | |
debian/ruby2.7 | 2.7.4-1+deb11u1 | |
redhat/rubygem-json | <2.3.0 | 2.3.0 |
Apple macOS | <11.0.1 | 11.0.1 |
JSON project JSON Ruby | <=2.2.0 | |
Ruby | >=2.4.0<=2.4.9 | |
Ruby | >=2.5.0<=2.5.7 | |
Ruby | >=2.6.0<=2.6.5 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
openSUSE | =15.1 | |
Debian GNU/Linux | =8.0 | |
Debian GNU/Linux | =10.0 | |
Apple macOS | =11.0.1 |
To mitigate this vulnerability, do not supply untrusted user input and/or untrusted strings to the following method calls or utilize code libraries which do so: ``` JSON(user_input) JSON[user_input, nil] JSON.parse(user_input, nil) JSON::Parser.new(user_input).parse ``` Also note that JSON.load() should never be given input from unknown sources.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2020-10663 is an Unsafe Object Creation Vulnerability in the JSON gem for Ruby.
Ruby versions 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5 are affected by CVE-2020-10663.
CVE-2020-10663 has a severity value of 7, which is considered high.
To fix CVE-2020-10663, update your Ruby installation to a version that includes the fix.
You can find more information about CVE-2020-10663 on the CVE website, NIST vulnerability database, Ruby's official website, and Red Hat's bugzilla and errata pages.