First published: Mon Mar 25 2019(Updated: )
An issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is eval-ed by code in ensure_loadable_spec during the preinstall check. Upstream patch: <a href="https://bugs.ruby-lang.org/attachments/7669">https://bugs.ruby-lang.org/attachments/7669</a> References: <a href="https://www.ruby-lang.org/en/news/2019/03/05/multiple-vulnerabilities-in-rubygems/">https://www.ruby-lang.org/en/news/2019/03/05/multiple-vulnerabilities-in-rubygems/</a> <a href="https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html">https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html</a>
Affected Software | Affected Version | How to fix |
---|---|---|
RubyGems | >=2.6<=3.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1692520 is considered critical due to the potential for arbitrary code execution.
To fix REDHAT-BUG-1692520, upgrade RubyGems to a version higher than 3.0.2, where the vulnerability has been patched.
RubyGems versions from 2.6 to 3.0.2 are affected by the vulnerability defined in REDHAT-BUG-1692520.
Yes, REDHAT-BUG-1692520 can potentially be exploited remotely through the installation of a malicious gem.
Exploiting REDHAT-BUG-1692520 allows an attacker to execute arbitrary code on the victim's system, leading to potential data breaches and system compromise.