CVE-2024-27282

An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings. The fixed versions are 3.0.7, 3.1.5, 3.2.4, and 3.3.1.
Configurations

No configuration.

History

21 Nov 2024, 09:04

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20241011-0007/ -
References () https://hackerone.com/reports/2122624 - () https://hackerone.com/reports/2122624 -
References () https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/ - () https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/ -

01 Nov 2024, 19:35

Type Values Removed Values Added
Summary
  • (es) Se descubrió un problema en Ruby 3.x hasta 3.3.0. Si los datos proporcionados por el atacante se proporcionan al compilador de expresiones regulares de Ruby, es posible extraer datos del montón arbitrarios relacionados con el inicio del texto, incluidos punteros y cadenas confidenciales. Las versiones fijas son 3.0.7, 3.1.5, 3.2.4 y 3.3.1.
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.6
CWE CWE-125

14 May 2024, 15:11

Type Values Removed Values Added
New CVE

Information

Published : 2024-05-14 15:11

Updated : 2024-11-21 09:04


NVD link : CVE-2024-27282

Mitre link : CVE-2024-27282

CVE.ORG link : CVE-2024-27282


JSON object : View

Products Affected

No product.

CWE
CWE-125

Out-of-bounds Read