CVE-2019-13354

The strong_password gem 0.0.7 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. The current version, without this backdoor, is 0.0.6.
Configurations

Configuration 1 (hide)

cpe:2.3:a:strong_password_project:strong_password:0.0.7:*:*:*:*:ruby:*:*

History

21 Nov 2024, 04:24

Type Values Removed Values Added
References () https://benjamin-bouchet.com/blog/vulnerabilite-dans-la-gem-strong_password-0-0-7/ - Third Party Advisory () https://benjamin-bouchet.com/blog/vulnerabilite-dans-la-gem-strong_password-0-0-7/ - Third Party Advisory
References () https://github.com/bdmac/strong_password/releases - Release Notes, Third Party Advisory () https://github.com/bdmac/strong_password/releases - Release Notes, Third Party Advisory
References () https://rubygems.org/gems/strong_password/versions - Release Notes, Third Party Advisory () https://rubygems.org/gems/strong_password/versions - Release Notes, Third Party Advisory
References () https://withatwist.dev/strong-password-rubygem-hijacked.html - Third Party Advisory () https://withatwist.dev/strong-password-rubygem-hijacked.html - Third Party Advisory

Information

Published : 2019-07-08 14:15

Updated : 2024-11-21 04:24


NVD link : CVE-2019-13354

Mitre link : CVE-2019-13354

CVE.ORG link : CVE-2019-13354


JSON object : View

Products Affected

strong_password_project

  • strong_password
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')