First published: Sun May 02 2021(Updated: )
An operating system command injection flaw was found in RDoc. Using the rdoc command to generate documentation for a malicious Ruby source code could lead to execution of arbitrary commands with the privileges of the user running rdoc.
Credit: cve@mitre.org cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-ruby27-ruby | <0:2.7.4-130.el7 | 0:2.7.4-130.el7 |
redhat/rh-ruby30-ruby | <0:3.0.2-148.el7 | 0:3.0.2-148.el7 |
redhat/rh-ruby26-ruby | <0:2.6.9-120.el7 | 0:2.6.9-120.el7 |
redhat/rubygem-rdoc | <6.3.1 | 6.3.1 |
redhat/ruby | <3.0.2 | 3.0.2 |
redhat/ruby | <2.7.4 | 2.7.4 |
redhat/ruby | <2.6.8 | 2.6.8 |
debian/ruby2.7 | 2.7.4-1+deb11u1 2.7.4-1+deb11u2 | |
rubygems/rdoc | >=6.3.0<6.3.1 | 6.3.1 |
rubygems/rdoc | >=6.2.0<6.2.1.1 | 6.2.1.1 |
rubygems/rdoc | >=3.11<6.1.2.1 | 6.1.2.1 |
Debian GNU/Linux | =9.0 | |
Debian GNU/Linux | =10.0 | |
All of | ||
Ruby | <=3.0.1 | |
Ruby RDoc | >=3.11<6.3.1 | |
Oracle JD Edwards EnterpriseOne Tools | <9.2.6.1 | |
Ruby RDoc | >=3.11<6.3.1 | |
Ruby | <=3.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Appears in the following advisories)
CVE-2021-31799 is an operating system command injection vulnerability found in RDoc.
CVE-2021-31799 allows an attacker to execute arbitrary commands with the privileges of the user running rdoc in Ruby through version 3.0.1.
CVE-2021-31799 has a severity rating of 7, indicating a high severity vulnerability.
To fix CVE-2021-31799, update RDoc to version 6.3.1 or higher.
You can find more information about CVE-2021-31799 in the references provided: [Link 1](https://www.ruby-lang.org/en/news/2021/05/02/os-command-injection-in-rdoc/), [Link 2](https://github.com/ruby/rdoc/commit/a7f5d6ab88632b3b482fe10611382ff73d14eed7), [Link 3](https://www.ruby-lang.org/en/news/2021/07/07/ruby-3-0-2-released/).