Search for packages
purl | pkg:deb/ubuntu/ruby2.5@2.5.0-4ubuntu3 |
Next non-vulnerable version | 2.5.1-1ubuntu1.10 |
Latest non-vulnerable version | 2.5.5-4ubuntu2.1 |
Risk | 4.5 |
Vulnerability | Summary | Fixed by |
---|---|---|
VCID-1z7f-93a6-aaad
Aliases: CVE-2017-17790 |
The lazy_initialize function in lib/resolv.rb in Ruby through 2.4.3 uses Kernel#open, which might allow Command Injection attacks, as demonstrated by a Resolv::Hosts::new argument beginning with a '|' character, a different vulnerability than CVE-2017-17405. NOTE: situations with untrusted input may be highly unlikely. |
Affected by 20 other vulnerabilities. |
VCID-4cgb-86mu-aaab
Aliases: CVE-2018-1000078 GHSA-87qx-g5wg-mwmj |
Cross-site Scripting RubyGems contains a Cross Site Scripting (XSS) vulnerability in gem server display of homepage attribute that can result in XSS. This attack appears to be exploitable by the victim browsing to a malicious gem on a vulnerable gem server. |
Affected by 20 other vulnerabilities. |
VCID-4qeb-7mva-aaak
Aliases: CVE-2021-32066 |
An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. Net::IMAP does not raise an exception when StartTLS fails with an an unknown response, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack." |
Affected by 0 other vulnerabilities. |
VCID-6b5c-f279-aaan
Aliases: CVE-2018-8780 |
In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the Dir.open, Dir.new, Dir.entries and Dir.empty? methods do not check NULL characters. When using the corresponding method, unintentional directory traversal may be performed. |
Affected by 20 other vulnerabilities. |
VCID-6sbp-6c2v-aaad
Aliases: CVE-2018-6914 |
Directory traversal vulnerability in the Dir.mktmpdir method in the tmpdir library in Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1 might allow attackers to create arbitrary directories or files via a .. (dot dot) in the prefix argument. |
Affected by 20 other vulnerabilities. |
VCID-6u9x-t53x-aaak
Aliases: CVE-2018-16395 GHSA-mmrq-6999-72v8 |
An issue was discovered in the OpenSSL library in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. When two OpenSSL::X509::Name objects are compared using ==, depending on the ordering, non-equal objects may return true. When the first argument is one character longer than the second, or the second argument contains a character that is one less than a character in the same position of the first argument, the result of == will be true. This could be leveraged to create an illegitimate certificate that may be accepted as legitimate and then used in signing or encryption operations. |
Affected by 11 other vulnerabilities. |
VCID-6z6r-wcyq-aaar
Aliases: CVE-2019-8321 GHSA-fr32-gr5c-xq5c |
An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::UserInteraction#verbose calls say without escaping, escape sequence injection is possible. |
Affected by 5 other vulnerabilities. |
VCID-cwjg-g5zq-aaaj
Aliases: CVE-2016-2338 |
An exploitable heap overflow vulnerability exists in the Psych::Emitter start_document function of Ruby. In Psych::Emitter start_document function heap buffer "head" allocation is made based on tags array length. Specially constructed object passed as element of tags array can increase this array size after mentioned allocation and cause heap overflow. |
Affected by 0 other vulnerabilities. |
VCID-e8zx-a38v-aaac
Aliases: CVE-2018-1000077 GHSA-gv86-43rv-79m2 |
RubyGems contains an Improper Input Validation vulnerability in ruby gems specification homepage attribute that can result in a malicious gem being able to set an invalid homepage URL. |
Affected by 20 other vulnerabilities. |
VCID-g4xk-khpk-aaae
Aliases: CVE-2018-1000079 GHSA-8qxg-mff5-j3wc |
Path Traversal RubyGems contains a Directory Traversal vulnerability in gem installation that can result in the gem being able to write to arbitrary filesystem locations during installation. This attack appears to be exploitable by a victim installing a malicious gem. |
Affected by 20 other vulnerabilities. |
VCID-gh4h-bkuv-aaaj
Aliases: CVE-2019-8324 GHSA-76wm-422q-92mq |
An issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is eval-ed by code in ensure_loadable_spec during the preinstall check. |
Affected by 5 other vulnerabilities. |
VCID-gmf4-gcd5-aaab
Aliases: CVE-2021-31799 GHSA-ggxm-pgc9-g7fp |
In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby through 3.0.1, it is possible to execute arbitrary code via | and tags in a filename. |
Affected by 0 other vulnerabilities. |
VCID-haxq-y43b-aaah
Aliases: CVE-2019-8325 GHSA-4wm8-fjv7-j774 |
An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::CommandManager#run calls alert_error without escaping, escape sequence injection is possible. (There are many ways to cause an error.) |
Affected by 5 other vulnerabilities. |
VCID-jfww-25z5-aaab
Aliases: CVE-2019-16255 |
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows code injection if the first argument (aka the "command" argument) to Shell#[] or Shell#test in lib/shell.rb is untrusted data. An attacker can exploit this to call an arbitrary Ruby method. |
Affected by 0 other vulnerabilities. |
VCID-k1fn-z95u-aaaf
Aliases: CVE-2018-16396 |
An issue was discovered in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. It does not taint strings that result from unpacking tainted strings with some formats. |
Affected by 19 other vulnerabilities. |
VCID-k8n8-34gy-aaak
Aliases: CVE-2018-8778 |
In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, an attacker controlling the unpacking format (similar to format string vulnerabilities) can trigger a buffer under-read in the String#unpack method, resulting in a massive and controlled information disclosure. |
Affected by 20 other vulnerabilities. |
VCID-kve1-ww86-aaab
Aliases: CVE-2018-1000073 GHSA-gx69-6cp4-hxrj |
Path Traversal RubyGems contains a Directory Traversal vulnerability in install_location function of `package.rb` that can result in path traversal when writing to a symlinked basedir outside the root. |
Affected by 20 other vulnerabilities. |
VCID-kz8n-gkrg-aaad
Aliases: CVE-2019-16201 |
WEBrick::HTTPAuth::DigestAuth in Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 has a regular expression Denial of Service cause by looping/backtracking. A victim must expose a WEBrick server that uses DigestAuth to the Internet or a untrusted network. |
Affected by 0 other vulnerabilities. |
VCID-mgk2-6nxp-aaae
Aliases: CVE-2018-1000076 GHSA-mc6j-h948-v2p6 |
RubyGems contains an Improper Verification of Cryptographic Signature vulnerability in `package.rb` that can result in a mis-signed gem being installed, as the tarball would contain multiple gem signatures. |
Affected by 20 other vulnerabilities. |
VCID-mjme-uddr-aaag
Aliases: CVE-2019-15845 |
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 mishandles path checking within File.fnmatch functions. |
Affected by 0 other vulnerabilities. |
VCID-mwa8-bggk-aaam
Aliases: CVE-2017-17742 |
Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1 allows an HTTP Response Splitting attack. An attacker can inject a crafted key and value into an HTTP response for the HTTP server of WEBrick. |
Affected by 20 other vulnerabilities. |
VCID-numd-qsts-aaae
Aliases: CVE-2018-1000075 GHSA-74pv-v9gh-h25p |
Loop with Unreachable Exit Condition (Infinite Loop) RubyGems contains an infinite loop caused by negative size vulnerability in ruby gem package tar header that can result in a negative size could cause an infinite loop. |
Affected by 20 other vulnerabilities. |
VCID-nw56-rqyq-aaaq
Aliases: CVE-2021-28965 GHSA-8cr8-4vfw-mr7h |
The REXML gem before 3.2.5 in Ruby before 2.6.7, 2.7.x before 2.7.3, and 3.x before 3.0.1 does not properly address XML round-trip issues. An incorrect document can be produced after parsing and serializing. |
Affected by 3 other vulnerabilities. |
VCID-pguq-6u98-aaae
Aliases: CVE-2019-8322 GHSA-mh37-8c3g-3fgc |
An issue was discovered in RubyGems 2.6 and later through 3.0.2. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur. |
Affected by 5 other vulnerabilities. |
VCID-qeym-e3dp-aaab
Aliases: CVE-2018-8777 |
In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, an attacker can pass a large HTTP request with a crafted header to WEBrick server or a crafted body to WEBrick server/handler and cause a denial of service (memory consumption). |
Affected by 20 other vulnerabilities. |
VCID-qrfr-32tv-aaas
Aliases: CVE-2019-16254 |
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF. |
Affected by 0 other vulnerabilities. |
VCID-rzw4-4w1h-aaaj
Aliases: CVE-2020-10933 |
An issue was discovered in Ruby 2.5.x through 2.5.7, 2.6.x through 2.6.5, and 2.7.0. If a victim calls BasicSocket#read_nonblock(requested_size, buffer, exception: false), the method resizes the buffer to fit the requested size, but no data is copied. Thus, the buffer string provides the previous value of the heap. This may expose possibly sensitive data from the interpreter. |
Affected by 4 other vulnerabilities. |
VCID-smb4-9ksp-aaah
Aliases: CVE-2019-8323 GHSA-3h4r-pjv6-cph9 |
An issue was discovered in RubyGems 2.6 and later through 3.0.2. Gem::GemcutterUtilities#with_response may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur. |
Affected by 5 other vulnerabilities. |
VCID-sth6-4edt-aaar
Aliases: CVE-2020-25613 GHSA-gwfg-cqmg-cf8f |
An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack. |
Affected by 4 other vulnerabilities. |
VCID-t5p8-75v9-aaap
Aliases: CVE-2020-10663 GHSA-jphg-qwrw-7w9g |
The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulnerability. This is quite similar to CVE-2013-0269, but does not rely on poor garbage-collection behavior within Ruby. Specifically, use of JSON parsing methods can lead to creation of a malicious object within the interpreter, with adverse effects that are application-dependent. |
Affected by 4 other vulnerabilities. |
VCID-wbaq-bqk9-aaas
Aliases: CVE-2019-8320 GHSA-5x32-c9mf-49cc |
A Directory Traversal issue was discovered in RubyGems 2.7.6 and later through 3.0.2. Before making new directories or touching files (which now include path-checking code for symlinks), it would delete the target destination. If that destination was hidden behind a symlink, a malicious gem could delete arbitrary files on the user's machine, presuming the attacker could guess at paths. Given how frequently gem is run as sudo, and how predictable paths are on modern systems (/tmp, /usr, etc.), this could likely lead to data loss or an unusable system. |
Affected by 5 other vulnerabilities. |
VCID-xv5b-y3av-aaae
Aliases: CVE-2021-31810 |
An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. A malicious FTP server can use the PASV response to trick Net::FTP into connecting back to a given IP address and port. This potentially makes curl extract information about services that are otherwise private and not disclosed (e.g., the attacker can conduct port scans and service banner extractions). |
Affected by 0 other vulnerabilities. |
VCID-xxge-wqtp-aaag
Aliases: CVE-2018-8779 |
In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the UNIXServer.open and UNIXSocket.open methods are not checked for null characters. It may be connected to an unintended socket. |
Affected by 20 other vulnerabilities. |
VCID-zan6-q8p4-aaag
Aliases: CVE-2018-1000074 GHSA-qj2w-mw2r-pv39 |
RubyGems contains a Deserialization of Untrusted Data vulnerability in owner command that can result in code execution. This attack appears to be exploitable when the victim runs the `gem owner` command on a gem with a specially crafted YAML file. |
Affected by 20 other vulnerabilities. |
Vulnerability | Summary | Aliases |
---|---|---|
This package is not known to fix vulnerabilities. |
Date | Actor | Action | Vulnerability | Source | VulnerableCode Version |
---|