Arbitrary Code Execution Affecting rubygems-update package, versions <2.6.13
Snyk CVSS
Attack Complexity
Low
Integrity
High
Threat Intelligence
Exploit Maturity
Proof of concept
EPSS
0.88% (83rd
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-RUBY-RUBYGEMSUPDATE-472655
- published 13 Nov 2019
- disclosed 27 Aug 2017
- credit Yusuke Endoh
Introduced: 27 Aug 2017
CVE-2017-0901 Open this link in a new tabHow to fix?
Upgrade rubygems-update
to version 2.6.13 or higher.
Overview
rubygems-update is an inbuilt rubygem for updating rubygems.
Affected versions of this package are vulnerable to Arbitrary Code Execution. RubyGems version 2.6.12 and earlier fails to validate specification names, allowing a maliciously crafted gem to potentially overwrite any file on the filesystem.