RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-1421-1 | ruby2.1 security update |
![]() |
DSA-4031-1 | ruby2.3 security update |
![]() |
EUVD-2022-4613 | RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution. |
![]() |
GHSA-mqwr-4qf2-2hcv | RubyGems vulnerable to Deserialization of Untrusted Data |
![]() |
USN-3553-1 | Ruby vulnerabilities |
![]() |
USN-3685-1 | Ruby vulnerabilities |
![]() |
USN-3685-2 | Ruby regression |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-09-17T03:54:57.184Z
Reserved: 2016-11-30T00:00:00
Link: CVE-2017-0903

No data.

Status : Deferred
Published: 2017-10-11T18:29:00.583
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-0903


No data.