The omniauth-weibo-oauth2 gem 0.4.6 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. Versions through 0.4.5, and 0.5.1 and later, are unaffected.
References
Link | Resource |
---|---|
https://diff.coditsu.io/diffs/09a05c37-1b34-49e1-ac94-d4dda40d1ad1#d2h-971595 | Patch Third Party Advisory |
https://github.com/beenhero/omniauth-weibo-oauth2/issues/36 | Patch Third Party Advisory |
https://diff.coditsu.io/diffs/09a05c37-1b34-49e1-ac94-d4dda40d1ad1#d2h-971595 | Patch Third Party Advisory |
https://github.com/beenhero/omniauth-weibo-oauth2/issues/36 | Patch Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:31
Type | Values Removed | Values Added |
---|---|---|
References | () https://diff.coditsu.io/diffs/09a05c37-1b34-49e1-ac94-d4dda40d1ad1#d2h-971595 - Patch, Third Party Advisory | |
References | () https://github.com/beenhero/omniauth-weibo-oauth2/issues/36 - Patch, Third Party Advisory |
Information
Published : 2020-02-07 14:15
Updated : 2024-11-21 04:31
NVD link : CVE-2019-17268
Mitre link : CVE-2019-17268
CVE.ORG link : CVE-2019-17268
JSON object : View
Products Affected
omniauth-weibo-oauth2_project
- omniauth-weibo-oauth2
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')