RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-1421-1 ruby2.1 security update
Debian DSA Debian DSA DSA-4031-1 ruby2.3 security update
EUVD EUVD EUVD-2022-4613 RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution.
Github GHSA Github GHSA GHSA-mqwr-4qf2-2hcv RubyGems vulnerable to Deserialization of Untrusted Data
Ubuntu USN Ubuntu USN USN-3553-1 Ruby vulnerabilities
Ubuntu USN Ubuntu USN USN-3685-1 Ruby vulnerabilities
Ubuntu USN Ubuntu USN USN-3685-2 Ruby regression
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: hackerone

Published:

Updated: 2024-09-17T03:54:57.184Z

Reserved: 2016-11-30T00:00:00

Link: CVE-2017-0903

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2017-10-11T18:29:00.583

Modified: 2025-04-20T01:37:25.860

Link: CVE-2017-0903

cve-icon Redhat

Severity : Moderate

Publid Date: 2017-10-10T00:00:00Z

Links: CVE-2017-0903 - Bugzilla

cve-icon OpenCVE Enrichment

No data.