First published: Thu Mar 21 2024(Updated: )
An issue was discovered in RDoc 6.3.3 through 6.6.2, as distributed in Ruby 3.x through 3.3.0. When parsing .rdoc_options (used for configuration in RDoc) as a YAML file, object injection and resultant remote code execution are possible because there are no restrictions on the classes that can be restored. When loading the documentation cache, object injection and resultant remote code execution are also possible if there were a crafted cache.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/rdoc | >=6.3.3<6.3.4.1 | 6.3.4.1 |
rubygems/rdoc | >=6.6.0<6.6.3.1 | 6.6.3.1 |
rubygems/rdoc | >=6.5.0<6.5.1.1 | 6.5.1.1 |
rubygems/rdoc | >=6.4.0<6.4.1.1 | 6.4.1.1 |
redhat/rdoc | <6.3.4.1 | 6.3.4.1 |
redhat/rdoc | <6.4.1.1 | 6.4.1.1 |
redhat/rdoc | <6.5.1.1 | 6.5.1.1 |
debian/ruby2.7 | <=2.7.4-1+deb11u1 | 2.7.4-1+deb11u4 |
debian/ruby3.1 | <=3.1.2-8.5 | 3.1.2-7+deb12u1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-27281 has a critical severity rating due to the potential for remote code execution.
To fix CVE-2024-27281, update RDoc to version 6.3.4.1 or later for affected versions.
CVE-2024-27281 affects RDoc versions 6.3.3 through 6.6.2 distributed in Ruby 3.x through 3.3.0.
Exploitation of CVE-2024-27281 could allow attackers to perform remote code execution on affected systems.
There are no known workarounds for CVE-2024-27281, and updating is the recommended solution.