The Pixar ruby-jss gem before 1.6.0 allows remote attackers to execute arbitrary code because of the Plist gem's documented behavior of using Marshal.load during XML document processing.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-2261 | The Pixar ruby-jss gem before 1.6.0 allows remote attackers to execute arbitrary code because of the Plist gem's documented behavior of using Marshal.load during XML document processing. |
Github GHSA |
GHSA-vmfh-c547-v45h | Remote code execution in ruby-jss |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-03T23:50:43.144Z
Reserved: 2021-05-25T00:00:00.000Z
Link: CVE-2021-33575
No data.
Status : Modified
Published: 2021-05-25T23:15:07.457
Modified: 2024-11-21T06:09:07.350
Link: CVE-2021-33575
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA