ALT-PU-2020-1679-1
Closed vulnerabilities
BDU:2020-00835
Уязвимость реализации метода интерпретатора языка программирования Ruby, позволяющая нарушителю выполнить произвольный код
BDU:2020-00863
Уязвимость метода File.fnmatch интерпретатора языка программирования Ruby, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2020-00865
Уязвимость реализации класса WEBrick::HTTPAuth::DigestAuth библиотеки WEBrick интерпретатора языка программирования Ruby, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00866
Уязвимость библиотеки WEBrick интерпретатора языка программирования Ruby, позволяющая нарушителю осуществить межсайтовые сценарные атаки
BDU:2020-04073
Уязвимость HTTP-сервера для Ruby/Rack приложений Puma, связанная с некорректной нейтрализацией символов CR, LF, /r и /n перед внесением данных в HTTP-заголовки, позволяющая нарушителю осуществлять межсайтовые сценарные атаки
Modified: 2024-11-21
CVE-2019-15845
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 mishandles path checking within File.fnmatch functions.
- openSUSE-SU-2020:0395
- openSUSE-SU-2020:0395
- https://hackerone.com/reports/449617
- https://hackerone.com/reports/449617
- [debian-lts-announce] 20191125 [SECURITY] [DLA 2007-1] ruby2.1 security update
- [debian-lts-announce] 20191125 [SECURITY] [DLA 2007-1] ruby2.1 security update
- 20191217 [SECURITY] [DSA 4587-1] ruby2.3 security update
- 20191217 [SECURITY] [DSA 4587-1] ruby2.3 security update
- 20191217 [SECURITY] [DSA 4586-1] ruby2.5 security update
- 20191217 [SECURITY] [DSA 4586-1] ruby2.5 security update
- GLSA-202003-06
- GLSA-202003-06
- USN-4201-1
- USN-4201-1
- DSA-4587
- DSA-4587
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
Modified: 2024-11-21
CVE-2019-16201
WEBrick::HTTPAuth::DigestAuth in Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 has a regular expression Denial of Service cause by looping/backtracking. A victim must expose a WEBrick server that uses DigestAuth to the Internet or a untrusted network.
- openSUSE-SU-2020:0395
- openSUSE-SU-2020:0395
- https://hackerone.com/reports/661722
- https://hackerone.com/reports/661722
- https://lists.debian.org/debian-lts-announce/2019/11/msg00025.html
- https://lists.debian.org/debian-lts-announce/2019/11/msg00025.html
- [debian-lts-announce] 20191210 [SECURITY] [DLA 2027-1] jruby security update
- [debian-lts-announce] 20191210 [SECURITY] [DLA 2027-1] jruby security update
- [debian-lts-announce] 20200816 [SECURITY] [DLA 2330-1] jruby security update
- [debian-lts-announce] 20200816 [SECURITY] [DLA 2330-1] jruby security update
- [debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update
- [debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update
- 20191217 [SECURITY] [DSA 4587-1] ruby2.3 security update
- 20191217 [SECURITY] [DSA 4587-1] ruby2.3 security update
- 20191217 [SECURITY] [DSA 4586-1] ruby2.5 security update
- 20191217 [SECURITY] [DSA 4586-1] ruby2.5 security update
- GLSA-202003-06
- GLSA-202003-06
- DSA-4587
- DSA-4587
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
Modified: 2024-11-21
CVE-2019-16254
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF.
- openSUSE-SU-2020:0395
- openSUSE-SU-2020:0395
- https://hackerone.com/reports/331984
- https://hackerone.com/reports/331984
- https://lists.debian.org/debian-lts-announce/2019/11/msg00025.html
- https://lists.debian.org/debian-lts-announce/2019/11/msg00025.html
- [debian-lts-announce] 20191210 [SECURITY] [DLA 2027-1] jruby security update
- [debian-lts-announce] 20191210 [SECURITY] [DLA 2027-1] jruby security update
- [debian-lts-announce] 20200816 [SECURITY] [DLA 2330-1] jruby security update
- [debian-lts-announce] 20200816 [SECURITY] [DLA 2330-1] jruby security update
- [debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update
- [debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update
- 20191217 [SECURITY] [DSA 4587-1] ruby2.3 security update
- 20191217 [SECURITY] [DSA 4587-1] ruby2.3 security update
- 20191217 [SECURITY] [DSA 4586-1] ruby2.5 security update
- 20191217 [SECURITY] [DSA 4586-1] ruby2.5 security update
- GLSA-202003-06
- GLSA-202003-06
- DSA-4586
- DSA-4586
- DSA-4587
- DSA-4587
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.ruby-lang.org/ja/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254/
- https://www.ruby-lang.org/ja/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-4-8-released/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-4-8-released/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-5-7-released/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-5-7-released/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-6-5-released/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-6-5-released/
Modified: 2024-11-21
CVE-2019-16255
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows code injection if the first argument (aka the "command" argument) to Shell#[] or Shell#test in lib/shell.rb is untrusted data. An attacker can exploit this to call an arbitrary Ruby method.
- openSUSE-SU-2020:0395
- openSUSE-SU-2020:0395
- https://hackerone.com/reports/327512
- https://hackerone.com/reports/327512
- https://lists.debian.org/debian-lts-announce/2019/11/msg00025.html
- https://lists.debian.org/debian-lts-announce/2019/11/msg00025.html
- [debian-lts-announce] 20191210 [SECURITY] [DLA 2027-1] jruby security update
- [debian-lts-announce] 20191210 [SECURITY] [DLA 2027-1] jruby security update
- [debian-lts-announce] 20200816 [SECURITY] [DLA 2330-1] jruby security update
- [debian-lts-announce] 20200816 [SECURITY] [DLA 2330-1] jruby security update
- [debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update
- [debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update
- 20191217 [SECURITY] [DSA 4587-1] ruby2.3 security update
- 20191217 [SECURITY] [DSA 4587-1] ruby2.3 security update
- 20191217 [SECURITY] [DSA 4586-1] ruby2.5 security update
- 20191217 [SECURITY] [DSA 4586-1] ruby2.5 security update
- GLSA-202003-06
- GLSA-202003-06
- DSA-4587
- DSA-4587
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.ruby-lang.org/ja/news/2019/10/01/code-injection-shell-test-cve-2019-16255/
- https://www.ruby-lang.org/ja/news/2019/10/01/code-injection-shell-test-cve-2019-16255/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-4-8-released/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-4-8-released/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-5-7-released/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-5-7-released/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-6-5-released/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-6-5-released/
Modified: 2024-11-21
CVE-2020-5247
In Puma (RubyGem) before 4.3.2 and before 3.12.3, if an application using Puma allows untrusted input in a response header, an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content, such as additional headers or an entirely new response body. This vulnerability is known as HTTP Response Splitting. While not an attack in itself, response splitting is a vector for several other attacks, such as cross-site scripting (XSS). This is related to CVE-2019-16254, which fixed this vulnerability for the WEBrick Ruby web server. This has been fixed in versions 4.3.2 and 3.12.3 by checking all headers for line endings and rejecting headers with those characters.
- https://github.com/puma/puma/security/advisories/GHSA-84j7-475p-hp8v
- https://github.com/puma/puma/security/advisories/GHSA-84j7-475p-hp8v
- [debian-lts-announce] 20220525 [SECURITY] [DLA 3023-1] puma security update
- [debian-lts-announce] 20220525 [SECURITY] [DLA 3023-1] puma security update
- FEDORA-2020-fd87f90634
- FEDORA-2020-fd87f90634
- FEDORA-2020-08092b4c97
- FEDORA-2020-08092b4c97
- FEDORA-2020-a3f26a9387
- FEDORA-2020-a3f26a9387
- https://owasp.org/www-community/attacks/HTTP_Response_Splitting
- https://owasp.org/www-community/attacks/HTTP_Response_Splitting
- https://www.ruby-lang.org/en/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254
- https://www.ruby-lang.org/en/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254