First published: Thu Mar 19 2020(Updated: )
A flaw was found in rubygem-json. While parsing certain JSON documents, the json gem (including the one bundled with Ruby) can be coerced into creating arbitrary objects in the target system. This is the same issue as CVE-2013-0269.
Credit: Jeremy Evans cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/pcs | <0:0.10.4-6.el8_2.1 | 0:0.10.4-6.el8_2.1 |
redhat/pcs | <0:0.10.1-4.el8_0.5 | 0:0.10.1-4.el8_0.5 |
redhat/pcs | <0:0.10.2-4.el8_1.1 | 0:0.10.2-4.el8_1.1 |
redhat/rh-ruby25-ruby | <0:2.5.9-9.el7 | 0:2.5.9-9.el7 |
redhat/rh-ruby26-ruby | <0:2.6.7-119.el7 | 0:2.6.7-119.el7 |
redhat/rubygem-json | <2.3.0 | 2.3.0 |
Json Project Json | <=2.2.0 | |
Ruby-lang Ruby | >=2.4.0<=2.4.9 | |
Ruby-lang Ruby | >=2.5.0<=2.5.7 | |
Ruby-lang Ruby | >=2.6.0<=2.6.5 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 | |
openSUSE Leap | =15.1 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =10.0 | |
Apple macOS | =11.0.1 | |
Apple macOS Big Sur | <11.0.1 | 11.0.1 |
debian/ruby-json | 2.1.0+dfsg-2+deb10u1 2.3.0+dfsg-1 2.6.3+dfsg-1 | |
debian/ruby2.5 | 2.5.5-3+deb10u4 2.5.5-3+deb10u6 | |
debian/ruby2.7 | 2.7.4-1+deb11u1 |
To mitigate this vulnerability, do not supply untrusted user input and/or untrusted strings to the following method calls or utilize code libraries which do so: ``` JSON(user_input) JSON[user_input, nil] JSON.parse(user_input, nil) JSON::Parser.new(user_input).parse ``` Also note that JSON.load() should never be given input from unknown sources.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
(Found alongside the following vulnerabilities)
CVE-2020-10663 is an Unsafe Object Creation Vulnerability in the JSON gem for Ruby.
Ruby versions 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5 are affected by CVE-2020-10663.
CVE-2020-10663 has a severity value of 7, which is considered high.
To fix CVE-2020-10663, update your Ruby installation to a version that includes the fix.
You can find more information about CVE-2020-10663 on the CVE website, NIST vulnerability database, Ruby's official website, and Red Hat's bugzilla and errata pages.