RubyGems 2.6.2

CPE Details

RubyGems 2.6.2
2.6.2
2019-06-20 15:36 +00:00
2019-06-20 15:36 +00:00

Alerte pour un CPE

Stay informed of any changes for a specific CPE.
Alert management

CPE Name: cpe:2.3:a:rubygems:rubygems:2.6.2:*:*:*:*:*:*:*

Informations

Vendor

rubygems

Product

rubygems

Version

2.6.2

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2022-36073 2022-09-07 17:45 +00:00 RubyGems.org is the Ruby community gem host. A bug in password & email change confirmation code allowed an attacker to change their RubyGems.org account's email to an unowned email address. Having access to an account whose email has been changed could enable an attacker to save API keys for that account, and when a legitimate user attempts to create an account with their email (and has to reset password to gain access) and is granted access to other gems, the attacker would then be able to publish and yank versions of those gems. Commit number 90c9e6aac2d91518b479c51d48275c57de492d4d contains a patch for this issue.
8.8
HIGH
CVE-2019-8321 2019-06-17 17:02 +00:00 An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::UserInteraction#verbose calls say without escaping, escape sequence injection is possible.
7.5
HIGH
CVE-2019-8322 2019-06-17 17:02 +00:00 An issue was discovered in RubyGems 2.6 and later through 3.0.2. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur.
7.5
HIGH
CVE-2019-8323 2019-06-17 17:01 +00:00 An issue was discovered in RubyGems 2.6 and later through 3.0.2. Gem::GemcutterUtilities#with_response may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur.
7.5
HIGH
CVE-2019-8325 2019-06-17 16:59 +00:00 An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::CommandManager#run calls alert_error without escaping, escape sequence injection is possible. (There are many ways to cause an error.)
7.5
HIGH
CVE-2019-8324 2019-06-17 16:59 +00:00 An issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is eval-ed by code in ensure_loadable_spec during the preinstall check.
8.8
HIGH
CVE-2017-0903 2017-10-09 22:00 +00:00 RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution.
9.8
CRITICAL
CVE-2017-0900 2017-08-31 18:00 +00:00 RubyGems version 2.6.12 and earlier is vulnerable to maliciously crafted gem specifications to cause a denial of service attack against RubyGems clients who have issued a `query` command.
7.5
HIGH
CVE-2017-0899 2017-08-26 22:00 +00:00 RubyGems version 2.6.12 and earlier is vulnerable to maliciously crafted gem specifications that include terminal escape characters. Printing the gem specification would execute terminal escape sequences.
9.8
CRITICAL
CVE-2017-0901 2017-08-26 22:00 +00:00 RubyGems version 2.6.12 and earlier fails to validate specification names, allowing a maliciously crafted gem to potentially overwrite any file on the filesystem.
7.5
HIGH
CVE-2017-0902 2017-08-26 22:00 +00:00 RubyGems version 2.6.12 and earlier is vulnerable to a DNS hijacking vulnerability that allows a MITM attacker to force the RubyGems client to download and install gems from a server that the attacker controls.
8.1
HIGH
Click on the button to the left (OFF), to authorize the inscription of cookie improving the functionalities of the site. Click on the button to the left (Accept all), to unauthorize the inscription of cookie improving the functionalities of the site.