First published: Mon Mar 25 2019(Updated: )
An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::UserInteraction#verbose calls say without escaping, escape sequence injection is possible. Upstream patch: <a href="https://bugs.ruby-lang.org/attachments/7669">https://bugs.ruby-lang.org/attachments/7669</a> References: <a href="https://www.ruby-lang.org/en/news/2019/03/05/multiple-vulnerabilities-in-rubygems/">https://www.ruby-lang.org/en/news/2019/03/05/multiple-vulnerabilities-in-rubygems/</a> <a href="https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html">https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html</a>
Affected Software | Affected Version | How to fix |
---|---|---|
RubyGems | >=2.6<=3.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1692514 is classified as moderate due to the potential for escape sequence injection.
To fix REDHAT-BUG-1692514, update RubyGems to a version later than 3.0.2.
REDHAT-BUG-1692514 affects RubyGems versions from 2.6 up to and including 3.0.2.
REDHAT-BUG-1692514 can lead to escape sequence injection, potentially allowing for unexpected command execution.
The RubyGems maintainers are responsible for addressing and patching REDHAT-BUG-1692514.