Incorrect Behavior Order: Early Validation Affecting rubygem-puma-doc package, versions <0:4.3.12-1.el7rhgs


Severity

Recommended
high

Based on Red Hat Enterprise Linux security rating.

Threat Intelligence

EPSS
0.92% (83rd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-RHEL7-RUBYGEMPUMADOC-5293414
  • published21 Jun 2022
  • disclosed27 May 2022

Introduced: 27 May 2022

CVE-2022-30123  (opens in a new tab)
CWE-179  (opens in a new tab)

How to fix?

Upgrade RHEL:7 rubygem-puma-doc to version 0:4.3.12-1.el7rhgs or higher.
This issue was patched in RHSA-2023:1486.

NVD Description

Note: Versions mentioned in the description apply only to the upstream rubygem-puma-doc package and not the rubygem-puma-doc package as distributed by RHEL. See How to fix? for RHEL:7 relevant fixed versions and status.

A sequence injection vulnerability exists in Rack <2.0.9.1, <2.1.4.1 and <2.2.3.1 which could allow is a possible shell escape in the Lint and CommonLogger components of Rack.

CVSS Scores

version 3.1