CVE-2017-10784

The Basic authentication code in WEBrick library in Ruby before 2.2.8, 2.3.x before 2.3.5, and 2.4.x through 2.4.1 allows remote attackers to inject terminal emulator escape sequences into its log and possibly execute arbitrary commands via a crafted user name.
References
Link Resource
http://www.securityfocus.com/bid/100853 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039363 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1042004
https://access.redhat.com/errata/RHSA-2017:3485
https://access.redhat.com/errata/RHSA-2018:0378
https://access.redhat.com/errata/RHSA-2018:0583
https://access.redhat.com/errata/RHSA-2018:0585
https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
https://security.gentoo.org/glsa/201710-18
https://usn.ubuntu.com/3528-1/
https://usn.ubuntu.com/3685-1/
https://www.debian.org/security/2017/dsa-4031
https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-2-8-released/ Patch Vendor Advisory
https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-3-5-released/ Patch Vendor Advisory
https://www.ruby-lang.org/en/news/2017/09/14/webrick-basic-auth-escape-sequence-injection-cve-2017-10784/ Vendor Advisory
http://www.securityfocus.com/bid/100853 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1039363 Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1042004
https://access.redhat.com/errata/RHSA-2017:3485
https://access.redhat.com/errata/RHSA-2018:0378
https://access.redhat.com/errata/RHSA-2018:0583
https://access.redhat.com/errata/RHSA-2018:0585
https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
https://security.gentoo.org/glsa/201710-18
https://usn.ubuntu.com/3528-1/
https://usn.ubuntu.com/3685-1/
https://www.debian.org/security/2017/dsa-4031
https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-2-8-released/ Patch Vendor Advisory
https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-3-5-released/ Patch Vendor Advisory
https://www.ruby-lang.org/en/news/2017/09/14/webrick-basic-auth-escape-sequence-injection-cve-2017-10784/ Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.3.0:preview1:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.3.0:preview2:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.3.2:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.3.3:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.3.4:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.4.0:preview1:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.4.0:preview2:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.4.0:preview3:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.4.0:rc1:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:2.4.1:*:*:*:*:*:*:*

History

21 Nov 2024, 03:06

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/100853 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/100853 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1039363 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1039363 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1042004 - () http://www.securitytracker.com/id/1042004 -
References () https://access.redhat.com/errata/RHSA-2017:3485 - () https://access.redhat.com/errata/RHSA-2017:3485 -
References () https://access.redhat.com/errata/RHSA-2018:0378 - () https://access.redhat.com/errata/RHSA-2018:0378 -
References () https://access.redhat.com/errata/RHSA-2018:0583 - () https://access.redhat.com/errata/RHSA-2018:0583 -
References () https://access.redhat.com/errata/RHSA-2018:0585 - () https://access.redhat.com/errata/RHSA-2018:0585 -
References () https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html - () https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html -
References () https://security.gentoo.org/glsa/201710-18 - () https://security.gentoo.org/glsa/201710-18 -
References () https://usn.ubuntu.com/3528-1/ - () https://usn.ubuntu.com/3528-1/ -
References () https://usn.ubuntu.com/3685-1/ - () https://usn.ubuntu.com/3685-1/ -
References () https://www.debian.org/security/2017/dsa-4031 - () https://www.debian.org/security/2017/dsa-4031 -
References () https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-2-8-released/ - Patch, Vendor Advisory () https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-2-8-released/ - Patch, Vendor Advisory
References () https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-3-5-released/ - Patch, Vendor Advisory () https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-3-5-released/ - Patch, Vendor Advisory
References () https://www.ruby-lang.org/en/news/2017/09/14/webrick-basic-auth-escape-sequence-injection-cve-2017-10784/ - Vendor Advisory () https://www.ruby-lang.org/en/news/2017/09/14/webrick-basic-auth-escape-sequence-injection-cve-2017-10784/ - Vendor Advisory

Information

Published : 2017-09-19 17:29

Updated : 2024-11-21 03:06


NVD link : CVE-2017-10784

Mitre link : CVE-2017-10784

CVE.ORG link : CVE-2017-10784


JSON object : View

Products Affected

ruby-lang

  • ruby
CWE
CWE-287

Improper Authentication