Skip to content

Commit 2707558

Browse files
simar7RubySec CI
authored and
RubySec CI
committed
Updated advisory posts against rubysec/ruby-advisory-db@871af3b
1 parent 174990b commit 2707558

File tree

60 files changed

+464
-570
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

60 files changed

+464
-570
lines changed

advisories/_posts/2007-01-22-CVE-2007-0469.md

+8-11
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,7 @@
11
---
22
layout: advisory
3-
title: |
4-
CVE-2007-0469 (rubygems-update): RubyGems installer.rb extract_files Function Crafted GEM Package Arbitrary
5-
File Overwrite
3+
title: 'CVE-2007-0469 (rubygems-update): CVE-2007-0469 RubyGems: Specially-crafted
4+
Gem archive can overwrite system files'
65
comments: false
76
categories:
87
- rubygems-update
@@ -13,15 +12,13 @@ advisory:
1312
cve: 2007-0469
1413
osvdb: 33561
1514
url: https://nvd.nist.gov/vuln/detail/CVE-2007-0469
16-
title: |
17-
RubyGems installer.rb extract_files Function Crafted GEM Package Arbitrary
18-
File Overwrite
15+
title: 'CVE-2007-0469 RubyGems: Specially-crafted Gem archive can overwrite system
16+
files'
1917
date: 2007-01-22
20-
description: |
21-
The extract_files function in installer.rb in RubyGems before 0.9.1 does not
22-
check whether files exist before overwriting them, which allows user-assisted
23-
remote attackers to overwrite arbitrary files, cause a denial of service, or
24-
execute arbitrary code via crafted GEM packages.
18+
description: The extract_files function in installer.rb in RubyGems before 0.9.1
19+
does not check whether files exist before overwriting them, which allows user-assisted
20+
remote attackers to overwrite arbitrary files, cause a denial of service, or execute
21+
arbitrary code via crafted GEM packages.
2522
cvss_v2: 9.3
2623
patched_versions:
2724
- ">= 0.9.1"

advisories/_posts/2007-11-27-CVE-2007-6183.md

+6-9
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,6 @@
11
---
22
layout: advisory
3-
title: 'CVE-2007-6183 (gtk2): Ruby-GNOME2 gtk/src/rbgtkmessagedialog.c Gtk::MessageDialog.new()
4-
Function Format String'
3+
title: 'CVE-2007-6183 (gtk2): CVE-2007-6183 ruby-gnome2: format string vulnerability'
54
comments: false
65
categories:
76
- gtk2
@@ -10,14 +9,12 @@ advisory:
109
cve: 2007-6183
1110
osvdb: 40774
1211
url: https://nvd.nist.gov/vuln/detail/CVE-2007-6183
13-
title: Ruby-GNOME2 gtk/src/rbgtkmessagedialog.c Gtk::MessageDialog.new() Function
14-
Format String
12+
title: 'CVE-2007-6183 ruby-gnome2: format string vulnerability'
1513
date: 2007-11-27
16-
description: |
17-
Format string vulnerability in the mdiag_initialize function in
18-
gtk/src/rbgtkmessagedialog.c in Ruby-GNOME 2 (aka Ruby/Gnome2) 0.16.0, and
19-
SVN versions before 20071127, allows context-dependent attackers to execute
20-
arbitrary code via format string specifiers in the message parameter.
14+
description: Format string vulnerability in the mdiag_initialize function in gtk/src/rbgtkmessagedialog.c
15+
in Ruby-GNOME 2 (aka Ruby/Gnome2) 0.16.0, and SVN versions before 20071127, allows
16+
context-dependent attackers to execute arbitrary code via format string specifiers
17+
in the message parameter.
2118
cvss_v2: 6.8
2219
patched_versions:
2320
- "> 0.16.0"

advisories/_posts/2011-12-28-CVE-2011-5036.md

+7-11
Original file line numberDiff line numberDiff line change
@@ -1,8 +1,7 @@
11
---
22
layout: advisory
3-
title: 'CVE-2011-5036 (rack): Rack Hash Collision Form Parameter Parsing Remote DoS
4-
5-
'
3+
title: 'CVE-2011-5036 (rack): CVE-2011-5036 rubygem-rack: hash table collisions DoS
4+
(oCERT-2011-003)'
65
comments: false
76
categories:
87
- rack
@@ -11,15 +10,12 @@ advisory:
1110
cve: 2011-5036
1211
osvdb: 78121
1312
url: https://nvd.nist.gov/vuln/detail/CVE-2011-5036
14-
title: 'Rack Hash Collision Form Parameter Parsing Remote DoS
15-
16-
'
13+
title: 'CVE-2011-5036 rubygem-rack: hash table collisions DoS (oCERT-2011-003)'
1714
date: 2011-12-28
18-
description: |
19-
Rack contains a flaw that may allow a remote denial of service. The issue is
20-
triggered when an attacker sends multiple crafted parameters which trigger
21-
hash collisions, and will result in loss of availability for the program via
22-
CPU consumption.
15+
description: Rack before 1.1.3, 1.2.x before 1.2.5, and 1.3.x before 1.3.6 computes
16+
hash values for form parameters without restricting the ability to trigger hash
17+
collisions predictably, which allows remote attackers to cause a denial of service
18+
(CPU consumption) by sending many crafted parameters.
2319
cvss_v2: 5.0
2420
patched_versions:
2521
- "~> 1.1.3"

advisories/_posts/2012-02-29-CVE-2012-6684.md

+5-9
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
layout: advisory
3-
title: 'CVE-2012-6684 (RedCloth): RedCloth Gem for Ruby Textile Link Parsing XSS'
3+
title: 'CVE-2012-6684 (RedCloth): CVE-2012-6684 rubygem-RedCloth: XSS vulnerability'
44
comments: false
55
categories:
66
- RedCloth
@@ -9,15 +9,11 @@ advisory:
99
cve: 2012-6684
1010
osvdb: 115941
1111
url: https://co3k.org/blog/redcloth-unfixed-xss-en
12-
title: RedCloth Gem for Ruby Textile Link Parsing XSS
12+
title: 'CVE-2012-6684 rubygem-RedCloth: XSS vulnerability'
1313
date: 2012-02-29
14-
description: |
15-
RedCloth Gem for Ruby contains a flaw that allows a cross-site scripting (XSS)
16-
attack. This flaw exists because the program does not validate input when
17-
parsing textile links before returning it to users. This may allow a remote
18-
attacker to create a specially crafted request that would execute arbitrary
19-
script code in a user's browser session within the trust relationship between
20-
their browser and the server.
14+
description: 'Cross-site scripting (XSS) vulnerability in the RedCloth library 4.2.9
15+
for Ruby and earlier allows remote attackers to inject arbitrary web script or
16+
HTML via a javascript: URI.'
2117
cvss_v2: 4.3
2218
patched_versions:
2319
- ">= 4.3.0"

advisories/_posts/2012-03-01-CVE-2012-1098.md

+8-10
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
layout: advisory
3-
title: 'CVE-2012-1098 (activesupport): Ruby on Rails SafeBuffer Object [] Direct Manipulation
4-
XSS'
3+
title: 'CVE-2012-1098 (activesupport): CVE-2012-1098 rubygem-activesupport: XSS in
4+
SafeBuffer#[] (unescaped safe buffers can be marked as safe)'
55
comments: false
66
categories:
77
- activesupport
@@ -12,15 +12,13 @@ advisory:
1212
cve: 2012-1098
1313
osvdb: 79726
1414
url: https://nvd.nist.gov/vuln/detail/CVE-2012-1098
15-
title: Ruby on Rails SafeBuffer Object [] Direct Manipulation XSS
15+
title: 'CVE-2012-1098 rubygem-activesupport: XSS in SafeBuffer#[] (unescaped safe
16+
buffers can be marked as safe)'
1617
date: 2012-03-01
17-
description: |
18-
Ruby on Rails contains a flaw that allows a remote cross-site scripting (XSS)
19-
attack. This flaw exists because athe application does not validate direct
20-
manipulations of SafeBuffer objects via '[]' and other methods. This may
21-
allow a user to create a specially crafted request that would execute
22-
arbitrary script code in a user's browser within the trust relationship
23-
between their browser and the server.
18+
description: Cross-site scripting (XSS) vulnerability in Ruby on Rails 3.0.x before
19+
3.0.12, 3.1.x before 3.1.4, and 3.2.x before 3.2.2 allows remote attackers to
20+
inject arbitrary web script or HTML via vectors involving a SafeBuffer object
21+
that is manipulated through certain methods.
2422
cvss_v2: 4.3
2523
unaffected_versions:
2624
- "< 3.0.0"

advisories/_posts/2012-03-01-CVE-2012-1099.md

+8-12
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
layout: advisory
3-
title: 'CVE-2012-1099 (actionpack): Ruby on Rails actionpack/lib/action_view/helpers/form_options_helper.rb
4-
Manually Generated Select Tag Options XSS'
3+
title: 'CVE-2012-1099 (actionpack): CVE-2012-1099 rubygem-actionpack: XSS in the ''select''
4+
helper'
55
comments: false
66
categories:
77
- actionpack
@@ -12,17 +12,13 @@ advisory:
1212
cve: 2012-1099
1313
osvdb: 79727
1414
url: https://nvd.nist.gov/vuln/detail/CVE-2012-1099
15-
title: Ruby on Rails actionpack/lib/action_view/helpers/form_options_helper.rb Manually
16-
Generated Select Tag Options XSS
15+
title: 'CVE-2012-1099 rubygem-actionpack: XSS in the ''select'' helper'
1716
date: 2012-03-01
18-
description: |
19-
Ruby on Rails contains a flaw that allows a remote cross-site scripting (XSS)
20-
attack. This flaw exists because the application does not validate manually
21-
generated 'select tag options' upon submission to
22-
actionpack/lib/action_view/helpers/form_options_helper.rb. This may allow a
23-
user to create a specially crafted request that would execute arbitrary
24-
script code in a user's browser within the trust relationship between their
25-
browser and the server.
17+
description: Cross-site scripting (XSS) vulnerability in actionpack/lib/action_view/helpers/form_options_helper.rb
18+
in the select helper in Ruby on Rails 3.0.x before 3.0.12, 3.1.x before 3.1.4,
19+
and 3.2.x before 3.2.2 allows remote attackers to inject arbitrary web script
20+
or HTML via vectors involving certain generation of OPTION elements within SELECT
21+
elements.
2622
cvss_v2: 4.3
2723
patched_versions:
2824
- "~> 3.0.12"

advisories/_posts/2012-03-14-CVE-2012-2139.md

+5-11
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,6 @@
11
---
22
layout: advisory
3-
title: 'CVE-2012-2139 (mail): Mail Gem for Ruby File Delivery Method to Parameter
4-
Traversal Arbitrary File Manipulation'
3+
title: 'CVE-2012-2139 (mail): CVE-2012-2139 rubygem-mail: directory traversal'
54
comments: false
65
categories:
76
- mail
@@ -10,16 +9,11 @@ advisory:
109
cve: 2012-2139
1110
osvdb: 81631
1211
url: https://nvd.nist.gov/vuln/detail/CVE-2012-2139
13-
title: Mail Gem for Ruby File Delivery Method to Parameter Traversal Arbitrary File
14-
Manipulation
12+
title: 'CVE-2012-2139 rubygem-mail: directory traversal'
1513
date: 2012-03-14
16-
description: 'Mail Gem for Ruby contains a flaw that allows a remote attacker to
17-
traverse outside of a restricted path. The issue is due to the program not properly
18-
sanitizing user input, specifically directory traversal style attacks (e.g., ../../)
19-
supplied via the ''to'' parameter within the delivery method. This directory traversal
20-
attack would allow the attacker to modify arbitrary files.
21-
22-
'
14+
description: Directory traversal vulnerability in lib/mail/network/delivery_methods/file_delivery.rb
15+
in the Mail gem before 2.4.4 for Ruby allows remote attackers to read arbitrary
16+
files via a .. (dot dot) in the to parameter.
2317
cvss_v2: 5.0
2418
patched_versions:
2519
- ">= 2.4.4"

advisories/_posts/2012-03-14-CVE-2012-2140.md

+6-7
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
layout: advisory
3-
title: 'CVE-2012-2140 (mail): Mail Gem for Ruby Multiple Delivery Method Remote Shell
4-
Command Execution'
3+
title: 'CVE-2012-2140 (mail): CVE-2012-2140 rubygem-mail: arbitrary command execution
4+
when using exim or sendmail from commandline'
55
comments: false
66
categories:
77
- mail
@@ -10,12 +10,11 @@ advisory:
1010
cve: 2012-2140
1111
osvdb: 81632
1212
url: https://nvd.nist.gov/vuln/detail/CVE-2012-2140
13-
title: Mail Gem for Ruby Multiple Delivery Method Remote Shell Command Execution
13+
title: 'CVE-2012-2140 rubygem-mail: arbitrary command execution when using exim
14+
or sendmail from commandline'
1415
date: 2012-03-14
15-
description: |
16-
Mail Gem for Ruby contains a flaw that occurs within the sendmail and exim
17-
delivery methods, which may allow an attacker to execute arbitrary shell
18-
commands..
16+
description: The Mail gem before 2.4.3 for Ruby allows remote attackers to execute
17+
arbitrary commands via shell metacharacters in a (1) sendmail or (2) exim delivery.
1918
cvss_v2: 7.5
2019
patched_versions:
2120
- ">= 2.4.4"

advisories/_posts/2012-04-20-CVE-2012-2126.md

+5-7
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
layout: advisory
3-
title: 'CVE-2012-2126 (rubygems-update): RubyGems SSL Certificate Validation MitM
4-
Spoofing Weakness'
3+
title: 'CVE-2012-2126 (rubygems-update): CVE-2012-2125 CVE-2012-2126 rubygems: Two
4+
security fixes in v1.8.23'
55
comments: false
66
categories:
77
- rubygems-update
@@ -12,12 +12,10 @@ advisory:
1212
cve: 2012-2126
1313
osvdb: 81444
1414
url: https://nvd.nist.gov/vuln/detail/CVE-2012-2126
15-
title: RubyGems SSL Certificate Validation MitM Spoofing Weakness
15+
title: 'CVE-2012-2125 CVE-2012-2126 rubygems: Two security fixes in v1.8.23'
1616
date: 2012-04-20
17-
description: |
18-
RubyGems contains a flaw related to the validation of SSL certificates when
19-
accessing certain services and APIs. This may allow a man-in-the-middle
20-
attacker to spoof a valid server.
17+
description: RubyGems before 1.8.23 does not verify an SSL certificate, which allows
18+
remote attackers to modify a gem during installation via a man-in-the-middle attack.
2119
cvss_v2: 4.3
2220
patched_versions:
2321
- ">= 1.8.23"

advisories/_posts/2012-05-04-CVE-2012-6109.md

+7-13
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,7 @@
11
---
22
layout: advisory
3-
title: 'CVE-2012-6109 (rack): Rack Regular Expressions Engine Content-Disposition
4-
Header Parsing Infinite Loop Remote DoS
5-
6-
'
3+
title: 'CVE-2012-6109 (rack): CVE-2012-6109 rubygem-rack: parsing Content-Disposition
4+
header DoS'
75
comments: false
86
categories:
97
- rack
@@ -12,16 +10,12 @@ advisory:
1210
cve: 2012-6109
1311
osvdb: 89317
1412
url: https://nvd.nist.gov/vuln/detail/CVE-2012-6109
15-
title: 'Rack Regular Expressions Engine Content-Disposition Header Parsing Infinite
16-
Loop Remote DoS
17-
18-
'
13+
title: 'CVE-2012-6109 rubygem-rack: parsing Content-Disposition header DoS'
1914
date: 2012-05-04
20-
description: |
21-
Rack contains a flaw in the Regular Expressions Engine that may allow a remote
22-
denial of service. The issue is triggered when parsing context-disposition
23-
headers. With a specially crafted header, a remote attacker can cause an
24-
infinite loop, which will result in a loss of availability for the webserver.
15+
description: lib/rack/multipart.rb in Rack before 1.1.4, 1.2.x before 1.2.6, 1.3.x
16+
before 1.3.7, and 1.4.x before 1.4.2 uses an incorrect regular expression, which
17+
allows remote attackers to cause a denial of service (infinite loop) via a crafted
18+
Content-Disposion header.
2519
cvss_v2: 4.3
2620
patched_versions:
2721
- "~> 1.1.4"

advisories/_posts/2012-05-31-CVE-2012-2660.md

+9-10
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
layout: advisory
3-
title: 'CVE-2012-2660 (activerecord): Ruby on Rails ActiveRecord Class Rack Query
4-
Parameter Parsing SQL Query Arbitrary IS NULL Clause Injection'
3+
title: 'CVE-2012-2660 (activerecord): CVE-2012-2660 rubygem-actionpack: Unsafe query
4+
generation'
55
comments: false
66
categories:
77
- activerecord
@@ -12,15 +12,14 @@ advisory:
1212
cve: 2012-2660
1313
osvdb: 82610
1414
url: https://nvd.nist.gov/vuln/detail/CVE-2012-2660
15-
title: Ruby on Rails ActiveRecord Class Rack Query Parameter Parsing SQL Query Arbitrary
16-
IS NULL Clause Injection
15+
title: 'CVE-2012-2660 rubygem-actionpack: Unsafe query generation'
1716
date: 2012-05-31
18-
description: |
19-
Ruby on Rails contains a flaw related to the way ActiveRecord handles
20-
parameters in conjunction with the way Rack parses query parameters.
21-
This issue may allow an attacker to inject arbitrary 'IS NULL' clauses in
22-
to application SQL queries. This may also allow an attacker to have the
23-
SQL query check for NULL in arbitrary places.
17+
description: actionpack/lib/action_dispatch/http/request.rb in Ruby on Rails before
18+
3.0.13, 3.1.x before 3.1.5, and 3.2.x before 3.2.4 does not properly consider
19+
differences in parameter handling between the Active Record component and the
20+
Rack interface, which allows remote attackers to bypass intended database-query
21+
restrictions and perform NULL checks via a crafted request, as demonstrated by
22+
certain "[nil]" values, a related issue to CVE-2012-2694.
2423
cvss_v2: 7.5
2524
patched_versions:
2625
- "~> 3.0.13"

advisories/_posts/2012-05-31-CVE-2012-2661.md

+9-9
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
layout: advisory
3-
title: 'CVE-2012-2661 (activerecord): Ruby on Rails where Method ActiveRecord Class
4-
SQL Injection'
3+
title: 'CVE-2012-2661 (activerecord): CVE-2012-2661 rubygem-activerecord: SQL injection
4+
when processing nested query paramaters'
55
comments: false
66
categories:
77
- activerecord
@@ -12,14 +12,14 @@ advisory:
1212
cve: 2012-2661
1313
osvdb: 82403
1414
url: https://nvd.nist.gov/vuln/detail/CVE-2012-2661
15-
title: Ruby on Rails where Method ActiveRecord Class SQL Injection
15+
title: 'CVE-2012-2661 rubygem-activerecord: SQL injection when processing nested
16+
query paramaters'
1617
date: 2012-05-31
17-
description: |
18-
Ruby on Rails (RoR) contains a flaw that may allow an attacker to carry out
19-
an SQL injection attack. The issue is due to the ActiveRecord class not
20-
properly sanitizing user-supplied input to the 'where' method. This may
21-
allow an attacker to inject or manipulate SQL queries in an application
22-
built on RoR, allowing for the manipulation or disclosure of arbitrary data.
18+
description: The Active Record component in Ruby on Rails 3.0.x before 3.0.13, 3.1.x
19+
before 3.1.5, and 3.2.x before 3.2.4 does not properly implement the passing of
20+
request data to a where method in an ActiveRecord class, which allows remote attackers
21+
to conduct certain SQL injection attacks via nested query parameters that leverage
22+
unintended recursion, a related issue to CVE-2012-2695.
2323
cvss_v2: 5.0
2424
unaffected_versions:
2525
- "~> 2.3.14"

advisories/_posts/2012-06-08-CVE-2012-6685.md

+4-8
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
layout: advisory
3-
title: 'CVE-2012-6685 (nokogiri): Nokogiri Gem for Ruby External Entity (XXE) Expansion
4-
Internal Network Response Remote Disclosure'
3+
title: 'CVE-2012-6685 (nokogiri): CVE-2012-6685 rubygem-nokogiri: XML eXternal Entity
4+
(XXE) flaw'
55
comments: false
66
categories:
77
- nokogiri
@@ -10,13 +10,9 @@ advisory:
1010
cve: 2012-6685
1111
osvdb: 90946
1212
url: https://nvd.nist.gov/vuln/detail/CVE-2012-6685
13-
title: Nokogiri Gem for Ruby External Entity (XXE) Expansion Internal Network Response
14-
Remote Disclosure
13+
title: 'CVE-2012-6685 rubygem-nokogiri: XML eXternal Entity (XXE) flaw'
1514
date: 2012-06-08
16-
description: libxml2 contains a flaw that may lead to unauthorized disclosure of
17-
potentially sensitive information. The issue is triggered when handling the expansion
18-
of XML external entities (XXE), which can be used to trigger URL's on an internal
19-
network and allow a remote attacker to gain access to their responses.
15+
description: Nokogiri before 1.5.4 is vulnerable to XXE attacks
2016
cvss_v2: 5.0
2117
patched_versions:
2218
- ">= 1.5.4"

0 commit comments

Comments
 (0)