CVE-2020-36327

Bundler 1.16.0 through 2.2.9 and 2.2.11 through 2.2.16 sometimes chooses a dependency source based on the highest gem version number, which means that a rogue gem found at a public source may be chosen, even if the intended choice was a private gem that is a dependency of another private gem that is explicitly depended on by the application. NOTE: it is not correct to use CVE-2021-24105 for every "Dependency Confusion" issue in every product.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:bundler:bundler:*:*:*:*:*:ruby:*:*
cpe:2.3:a:bundler:bundler:*:*:*:*:*:ruby:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:microsoft:package_manager_configurations:-:*:*:*:*:*:*:*

History

21 Nov 2024, 05:29

Type Values Removed Values Added
References () https://bundler.io/blog/2021/02/15/a-more-secure-bundler-we-fixed-our-source-priorities.html - Vendor Advisory () https://bundler.io/blog/2021/02/15/a-more-secure-bundler-we-fixed-our-source-priorities.html - Vendor Advisory
References () https://github.com/rubygems/rubygems/issues/3982 - Exploit, Issue Tracking, Third Party Advisory () https://github.com/rubygems/rubygems/issues/3982 - Exploit, Issue Tracking, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MWXHK5UUHVSHF7HTHMX6JY3WXDVNIHSL/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MWXHK5UUHVSHF7HTHMX6JY3WXDVNIHSL/ -
References () https://mensfeld.pl/2021/02/rubygems-dependency-confusion-attack-side-of-things/ - Third Party Advisory () https://mensfeld.pl/2021/02/rubygems-dependency-confusion-attack-side-of-things/ - Third Party Advisory
References () https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-24105 - Patch, Vendor Advisory () https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-24105 - Patch, Vendor Advisory
References () https://www.zofrex.com/blog/2021/04/29/bundler-still-vulnerable-dependency-confusion-cve-2020-36327/ - Exploit, Third Party Advisory () https://www.zofrex.com/blog/2021/04/29/bundler-still-vulnerable-dependency-confusion-cve-2020-36327/ - Exploit, Third Party Advisory

07 Nov 2023, 03:22

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWXHK5UUHVSHF7HTHMX6JY3WXDVNIHSL/', 'name': 'FEDORA-2021-36cdab1f8d', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MWXHK5UUHVSHF7HTHMX6JY3WXDVNIHSL/ -

Information

Published : 2021-04-29 03:15

Updated : 2024-11-21 05:29


NVD link : CVE-2020-36327

Mitre link : CVE-2020-36327

CVE.ORG link : CVE-2020-36327


JSON object : View

Products Affected

fedoraproject

  • fedora

bundler

  • bundler

microsoft

  • package_manager_configurations