Description
Bundler prior to 2.1.0 uses a predictable path in /tmp/, created with insecure permissions as a storage location for gems, if locations under the user's home directory are not available. If Bundler is used in a scenario where the user does not have a writable home directory, an attacker could place malicious code in this directory that would be later loaded and executed.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-1077 | Bundler prior to 2.1.0 uses a predictable path in /tmp/, created with insecure permissions as a storage location for gems, if locations under the user's home directory are not available. If Bundler is used in a scenario where the user does not have a writable home directory, an attacker could place malicious code in this directory that would be later loaded and executed. |
Github GHSA |
GHSA-g98m-96g9-wfjq | Insecure path handling in Bundler |
Ubuntu USN |
USN-4870-1 | Bundler vulnerability |
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T19:19:18.600Z
Reserved: 2019-01-03T00:00:00.000Z
Link: CVE-2019-3881
No data.
Status : Modified
Published: 2020-09-04T12:15:10.387
Modified: 2024-11-21T04:42:47.230
Link: CVE-2019-3881
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA
Ubuntu USN