RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1421-1 | ruby2.1 security update |
Debian DSA |
DSA-4031-1 | ruby2.3 security update |
EUVD |
EUVD-2022-4613 | RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution. |
Github GHSA |
GHSA-mqwr-4qf2-2hcv | RubyGems vulnerable to Deserialization of Untrusted Data |
Ubuntu USN |
USN-3553-1 | Ruby vulnerabilities |
Ubuntu USN |
USN-3685-1 | Ruby vulnerabilities |
Ubuntu USN |
USN-3685-2 | Ruby regression |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-09-17T03:54:57.184Z
Reserved: 2016-11-30T00:00:00
Link: CVE-2017-0903
No data.
Status : Deferred
Published: 2017-10-11T18:29:00.583
Modified: 2025-04-20T01:37:25.860
Link: CVE-2017-0903
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Github GHSA
Ubuntu USN