CVE编号
CVE-2018-1000079利用情况
暂无补丁情况
官方补丁披露时间
2018-03-14漏洞描述
rubygems版本ruby2.2系列:2.2.9和更早版本,ruby2.3系列:2.3.6和更早版本,ruby2.4系列:2.4.3和更早版本,ruby2.5系列:2.5.0和更早版本,在主干修订62422之前,GEM安装中包含一个目录遍历漏洞,可能导致GEM在安装过程中写入任意文件filesystem locations 。此攻击似乎可通过受害者安装恶意GEM进行攻击。该漏洞似乎已在2.7.6中修复。 解决建议
厂商已发布漏洞修复程序,请及时关注更新:https://github.com/rubygems/rubygems/commit/f83f911e19e27cbac1ccce7471d96642241dd759
参考链接 |
|
---|---|
http://blog.rubygems.org/2018/02/15/2.7.6-released.html | |
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html | |
https://access.redhat.com/errata/RHSA-2018:3729 | |
https://access.redhat.com/errata/RHSA-2018:3730 | |
https://access.redhat.com/errata/RHSA-2018:3731 | |
https://access.redhat.com/errata/RHSA-2019:2028 | |
https://access.redhat.com/errata/RHSA-2020:0542 | |
https://access.redhat.com/errata/RHSA-2020:0591 | |
https://access.redhat.com/errata/RHSA-2020:0663 | |
https://github.com/rubygems/rubygems/commit/666ef793cad42eed96f7aee1cdf77865db921099 | |
https://github.com/rubygems/rubygems/commit/f83f911e19e27cbac1ccce7471d96642241dd759 | |
https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html | |
https://usn.ubuntu.com/3621-1/ | |
https://www.debian.org/security/2018/dsa-4219 | |
https://www.debian.org/security/2018/dsa-4259 |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | rubygems | rubygems | * |
Up to (including) 2.2.9 |
|||||
运行在以下环境 | |||||||||
应用 | rubygems | rubygems | * |
Up to (including) 2.3.6 |
|||||
运行在以下环境 | |||||||||
应用 | rubygems | rubygems | * |
Up to (including) 2.4.3 |
|||||
运行在以下环境 | |||||||||
应用 | rubygems | rubygems | * |
Up to (including) 2.5.0 |
|||||
运行在以下环境 | |||||||||
系统 | alibaba_cloud_linux_2.1903 | ruby | * |
Up to (excluding) 4.0.0-36.1.al7 |
|||||
运行在以下环境 | |||||||||
系统 | amazon_2 | ruby | * |
Up to (excluding) 2.0.0.648-36.amzn2.0.1 |
|||||
运行在以下环境 | |||||||||
系统 | amazon_AMI | ruby | * |
Up to (excluding) 0.2.1-1.30.6.amzn1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_8 | ruby | * |
Up to (excluding) 2.1.5-2+deb8u2 |
|||||
运行在以下环境 | |||||||||
系统 | debian_9 | ruby | * |
Up to (excluding) 1.7.26-1+deb9u1 |
|||||
运行在以下环境 | |||||||||
系统 | debian_sid | ruby | * |
Up to (excluding) 3.2.0~rc.2-1 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_26 | ruby | * |
Up to (excluding) 2.4.3-87.fc26 |
|||||
运行在以下环境 | |||||||||
系统 | fedora_27 | ruby | * |
Up to (excluding) 2.4.3-87.fc27 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.0 | ruby | * |
Up to (excluding) 2.5.5-lp151.4.3.1 |
|||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.1 | ruby | * |
Up to (excluding) 2.5.5-lp151.4.3.1 |
|||||
运行在以下环境 | |||||||||
系统 | oracle_7 | ruby | * |
Up to (excluding) 1.7.7-36.el7 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP4 | ruby | * |
Up to (excluding) 2.1.9-19.3.2 |
|||||
运行在以下环境 | |||||||||
系统 | suse_12_SP5 | ruby | * |
Up to (excluding) 2.1.9-19.3.2 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04 | ruby | * |
Up to (excluding) 2.3.1-2~16.04.7 |
|||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04 | ruby | * |
Up to (excluding) 2.5.1-1 |
|||||
- 攻击路径 本地
- 攻击复杂度 复杂
- 权限要求 无需权限
- 影响范围 有限影响
- EXP成熟度 未验证
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 100
还没有评论,来说两句吧...