First published: Wed Oct 05 2016(Updated: )
A vulnerability was found in Bundler. Bundler allows the user to specify sources from which Ruby gems are installed. If a secondary source is specified, even if scoped to a specific gem, that source is silently applied to all declared gems. This allows an attacker to introduce arbitrary code into an application via gem name collision on the secondary source, which will unexpectedly (and without warning) take priority over the primary source. CVE request: <a href="http://seclists.org/oss-sec/2016/q4/18">http://seclists.org/oss-sec/2016/q4/18</a> CVE assignment: <a href="http://seclists.org/oss-sec/2016/q4/20">http://seclists.org/oss-sec/2016/q4/20</a> References: <a href="http://seclists.org/oss-sec/2016/q4/25">http://seclists.org/oss-sec/2016/q4/25</a>
Affected Software | Affected Version | How to fix |
---|---|---|
BusyBox |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1381951 is considered high due to the potential for arbitrary code execution.
To fix REDHAT-BUG-1381951, update Bundler to the latest version that addresses the vulnerability.
All versions of Bundler prior to the patched release are affected by REDHAT-BUG-1381951.
REDHAT-BUG-1381951 can allow attackers to inject malicious Ruby code into applications via compromised gem sources.
A temporary workaround for REDHAT-BUG-1381951 involves avoiding the use of secondary gem sources until the vulnerability is patched.