Skip to content

Commit 33907c1

Browse files
jasnowpostmodern
authored andcommitted
GSHA SYNC: 1 brand new advisory
1 parent 1f32ea5 commit 33907c1

File tree

1 file changed

+39
-0
lines changed

1 file changed

+39
-0
lines changed

gems/request_store/CVE-2024-43791.yml

+39
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,39 @@
1+
---
2+
gem: request_store
3+
cve: 2024-43791
4+
ghsa: frp2-5qfc-7r8m
5+
url: https://github.com/steveklabnik/request_store/security/advisories/GHSA-frp2-5qfc-7r8m
6+
title: request_store has Incorrect Default Permissions
7+
date: 2024-08-23
8+
description: |
9+
### Impact
10+
11+
The files published as part of request_store 1.3.2 have 0666
12+
permissions, meaning that they are world-writable, which allows
13+
local users to execute arbitrary code.
14+
15+
This version was published in 2017, and most production environments
16+
do not allow access for local users, so the chances of this being
17+
exploited are very low, given that the vast majority of users will
18+
have upgraded, and those that have not, if any, are not likely to
19+
be exposed.
20+
21+
### Patches
22+
23+
I am not aware of any other version of the gem with incorrect
24+
permissions, so simply upgrading should fix the issue.
25+
26+
### Workarounds
27+
28+
You could chmod the files yourself, I guess.
29+
cvss_v3: 7.8
30+
unaffected_versions:
31+
- "< 1.3.2"
32+
patched_versions:
33+
- ">= 1.4.0"
34+
related:
35+
url:
36+
- https://nvd.nist.gov/vuln/detail/CVE-2024-43791
37+
- https://github.com/steveklabnik/request_store/security/advisories/GHSA-frp2-5qfc-7r8m
38+
- https://cwe.mitre.org/data/definitions/276.html
39+
- https://github.com/advisories/GHSA-frp2-5qfc-7r8m

0 commit comments

Comments
 (0)