First published: Mon Mar 25 2019(Updated: )
An issue was discovered in RubyGems 2.6 and later through 3.0.2. Gem::GemcutterUtilities#with_response may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur. Upstream patch: <a href="https://bugs.ruby-lang.org/attachments/7669">https://bugs.ruby-lang.org/attachments/7669</a> References: <a href="https://www.ruby-lang.org/en/news/2019/03/05/multiple-vulnerabilities-in-rubygems/">https://www.ruby-lang.org/en/news/2019/03/05/multiple-vulnerabilities-in-rubygems/</a> <a href="https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html">https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html</a>
Affected Software | Affected Version | How to fix |
---|---|---|
RubyGems | >=2.6<=3.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1692519 is considered significant due to potential escape sequence injection.
To fix REDHAT-BUG-1692519, update RubyGems to version 3.0.3 or later.
RubyGems versions between 2.6 and 3.0.2 are affected by REDHAT-BUG-1692519.
REDHAT-BUG-1692519 is an issue that involves potential escape sequence injection through API response handling.
Developers using RubyGems versions 2.6 through 3.0.2 should be concerned about REDHAT-BUG-1692519.