CWE
862 863
Advisory Published
Updated

CVE-2022-29176: Unauthorized gem takeover for some gems on rubygems.org

First published: Thu May 05 2022(Updated: )

Rubygems is a package registry used to supply software for the Ruby language ecosystem. Due to a bug in the yank action, it was possible for any RubyGems.org user to remove and replace certain gems even if that user was not authorized to do so. To be vulnerable, a gem needed: one or more dashes in its name creation within 30 days OR no updates for over 100 days At present, we believe this vulnerability has not been exploited. RubyGems.org sends an email to all gem owners when a gem version is published or yanked. We have not received any support emails from gem owners indicating that their gem has been yanked without authorization. An audit of gem changes for the last 18 months did not find any examples of this vulnerability being used in a malicious way. A deeper audit for any possible use of this exploit is ongoing, and we will update this advisory once it is complete. Using Bundler in --frozen or --deployment mode in CI and during deploys, as the Bundler team has always recommended, will guarantee that your application does not silently switch to versions created using this exploit. To audit your application history for possible past exploits, review your Gemfile.lock and look for gems whose platform changed when the version number did not change. For example, gemname-3.1.2 updating to gemname-3.1.2-java could indicate a possible abuse of this vulnerability. RubyGems.org has been patched and is no longer vulnerable to this issue as of the 5th of May 2022.

Credit: security-advisories@github.com

Affected SoftwareAffected VersionHow to fix
Rubygems Rubygems.org

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2022-29176?

    CVE-2022-29176 is a vulnerability in Rubygems, a package registry used for the Ruby language ecosystem, that allowed unauthorized users to remove and replace certain gems.

  • How severe is CVE-2022-29176?

    CVE-2022-29176 is considered critical with a severity score of 7.5.

  • How does CVE-2022-29176 impact Rubygems users?

    CVE-2022-29176 allows unauthorized users to manipulate gems on Rubygems.org, potentially leading to malicious code execution or unauthorized access to sensitive information.

  • Is there a fix available for CVE-2022-29176?

    Yes, the vulnerability has been fixed in Rubygems.org. Users are advised to update to the latest version of Rubygems to mitigate the risk.

  • Where can I find more information about CVE-2022-29176?

    More information about CVE-2022-29176 can be found in the following references: [1] [2] [3]

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203