An issue was discovered in RubyGems 2.6 and later through 3.0.2. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur.
References
| Link | Resource |
|---|---|
| https://hackerone.com/reports/315087 | Permissions Required Third Party Advisory |
| http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html | Mailing List Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html | Mailing List Third Party Advisory |
Information
Published : 2019-06-17 13:15
Updated : 2020-08-19 12:00
NVD link : CVE-2019-8322
Mitre link : CVE-2019-8322
JSON object : View
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
Products Affected
debian
- debian_linux
rubygems
- rubygems
opensuse
- leap


