First published: Tue May 25 2021(Updated: )
The Pixar ruby-jss gem before 1.6.0 allows remote attackers to execute arbitrary code because of the Plist gem's documented behavior of using Marshal.load during XML document processing.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Pixar Ruby-jss | <1.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-33575 is a vulnerability in the Pixar ruby-jss gem before version 1.6.0 that allows remote attackers to execute arbitrary code due to the use of Marshal.load during XML document processing.
This vulnerability can be exploited by remote attackers to execute arbitrary code by manipulating XML documents processed by the Plist gem.
The severity of CVE-2021-33575 is critical, with a CVSS score of 9.8.
The Pixar ruby-jss gem versions before 1.6.0 are affected by this vulnerability.
To fix this vulnerability, it is recommended to update the Pixar ruby-jss gem to version 1.6.0 or newer.