Deserialization of Untrusted Data Affecting ruby2.3 package, versions <2.3.3-1+deb9u2
Snyk CVSS
Attack Complexity
Low
Confidentiality
High
Integrity
High
Availability
High
Threat Intelligence
EPSS
13.51% (96th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-DEBIAN9-RUBY23-308578
- published 11 Oct 2017
- disclosed 11 Oct 2017
Introduced: 11 Oct 2017
CVE-2017-0903 Open this link in a new tabHow to fix?
Upgrade Debian:9
ruby2.3
to version 2.3.3-1+deb9u2 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream ruby2.3
package and not the ruby2.3
package as distributed by Debian
.
See How to fix?
for Debian:9
relevant fixed versions and status.
RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution.
References
- https://security-tracker.debian.org/tracker/CVE-2017-0903
- https://www.debian.org/security/2017/dsa-4031
- https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
- https://github.com/rubygems/rubygems/commit/510b1638ac9bba3ceb7a5d73135dafff9e5bab49
- https://hackerone.com/reports/274990
- http://blog.rubygems.org/2017/10/09/2.6.14-released.html
- http://blog.rubygems.org/2017/10/09/unsafe-object-deserialization-vulnerability.html
- https://access.redhat.com/errata/RHSA-2017:3485
- https://access.redhat.com/errata/RHSA-2018:0378
- https://access.redhat.com/errata/RHSA-2018:0583
- https://access.redhat.com/errata/RHSA-2018:0585
- http://www.securityfocus.com/bid/101275
- http://people.ubuntu.com/~ubuntu-security/cve/CVE-2017-0903
- https://usn.ubuntu.com/3553-1/
- https://usn.ubuntu.com/3685-1/