[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247621

 
 

909

 
 

194512

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Ruby - (bulletinjan2019)

ID: oval:org.secpod.oval:def:2103534Date: (C)2019-12-30   (M)2024-02-19
Class: PATCHFamily: unix




Ruby before 2.4.3 allows Net::FTP command injection. Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file. If the localfile argument starts with the "|" pipe character, the command following the pipe character is executed. The default value of localfile is File.basename(remotefile), so malicious FTP servers could cause arbitrary command execution.

Platform:
Sun Solaris 11
Product:
runtime/ruby-23
runtime/ruby-23/ruby-tk
Reference:
bulletinjan2019
CVE-2017-17405
CVE-2016-2339
CVE-2017-0898
CVE-2017-10784
CVE-2017-14033
CVE-2017-14064
CVE-2017-17742
CVE-2017-17790
CVE-2017-6181
CVE-2017-9226
CVE-2017-9227
CVE-2017-9228
CVE-2017-9229
CVE-2018-16396
CVE-2018-6914
CVE-2018-8777
CVE-2018-8778
CVE-2018-8779
CVE-2018-8780
CVE    19
CVE-2017-9228
CVE-2017-9229
CVE-2016-2339
CVE-2017-0898
...
CPE    1
cpe:/o:oracle:solaris:11

© SecPod Technologies