The lazy_initialize function in lib/resolv.rb in Ruby through 2.4.3 uses Kernel#open, which might allow Command Injection attacks, as demonstrated by a Resolv::Hosts::new argument beginning with a '|' character, a different vulnerability than CVE-2017-17405. NOTE: situations with untrusted input may be highly unlikely.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 03:18
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/errata/RHSA-2018:0378 - | |
References | () https://access.redhat.com/errata/RHSA-2018:0583 - | |
References | () https://access.redhat.com/errata/RHSA-2018:0584 - | |
References | () https://access.redhat.com/errata/RHSA-2018:0585 - | |
References | () https://github.com/ruby/ruby/pull/1777 - Exploit, Issue Tracking, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2017/12/msg00024.html - | |
References | () https://lists.debian.org/debian-lts-announce/2017/12/msg00025.html - | |
References | () https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html - | |
References | () https://www.debian.org/security/2018/dsa-4259 - |
Information
Published : 2017-12-20 09:29
Updated : 2024-11-21 03:18
NVD link : CVE-2017-17790
Mitre link : CVE-2017-17790
CVE.ORG link : CVE-2017-17790
JSON object : View
Products Affected
ruby-lang
- ruby
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')