An issue was discovered in RubyGems 2.6 and later through 3.0.2. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html | Mailing List Third Party Advisory |
https://hackerone.com/reports/315087 | Permissions Required Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html | Mailing List Third Party Advisory |
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html | Mailing List Third Party Advisory |
https://hackerone.com/reports/315087 | Permissions Required Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html | Mailing List Third Party Advisory |
Configurations
History
21 Nov 2024, 04:49
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html - Mailing List, Third Party Advisory | |
References | () https://hackerone.com/reports/315087 - Permissions Required, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html - Mailing List, Third Party Advisory |
Information
Published : 2019-06-17 20:15
Updated : 2024-11-21 04:49
NVD link : CVE-2019-8322
Mitre link : CVE-2019-8322
CVE.ORG link : CVE-2019-8322
JSON object : View
Products Affected
debian
- debian_linux
rubygems
- rubygems
opensuse
- leap
CWE
CWE-74
Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')