Skip to content
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
32 changes: 32 additions & 0 deletions rubies/ruby/CVE-2011-3624.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,32 @@
---
engine: ruby
cve: 2011-3624
ghsa: rc82-v3mm-rhj2
url: https://nvd.nist.gov/vuln/detail/CVE-2011-3624
title: Various methods in WEBrick::HTTPRequest in Ruby 1.9.2 and 1.8.7
date: 2019-11-25
description: |
Various methods in WEBrick::HTTPRequest in Ruby
1.9.2-p290 and 1.8.7-p352 and earlier do not validate the
X-Forwarded-For, X-Forwarded-Host and X-Forwarded-Server headers in
requests, which might allow remote attackers to inject arbitrary text
into log files or bypass intended address parsing via a crafted header.

## Can only have one "notes:" field for adding these notes here:
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

notes: is free form text. This additional information should be put into notes:. The additional URLs can also be added to the related urls list.

- https://redmine.ruby-lang.org/issues/5418 mentioned CVE-2011-3187
- https://webservsec.blogspot.com/2011/02/ruby-on-rails-vulnerability.html
- https://redmine.ruby-lang.org/issues/5418 says:
- "WEBrick has been removed from ruby repository. If anyone interest
this, Please file this to https://github.com/ruby/webrick"
- Unclear when or if this was patched.
cvss_v2: 5.0
cvss_v3: 5.3
notes: Never patched
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is this is still unpatched?

Also, WEBrick was moved out of Ruby and into a separate gem as of Ruby 3.0.0. I feel like >= 3.0.0 should technically be the patched_versions.

related:
url:
- https://nvd.nist.gov/vuln/detail/CVE-2011-3624
- https://access.redhat.com/security/cve/cve-2011-3624
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3624
- https://security-tracker.debian.org/tracker/CVE-2011-3624
- https://github.com/ruby/webrick
- https://github.com/advisories/GHSA-rc82-v3mm-rhj2
21 changes: 21 additions & 0 deletions rubies/ruby/CVE-2016-2336.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,21 @@
---
engine: ruby
cve: 2016-2336
ghsa: f46g-7w88-2qv4
url: https://nvd.nist.gov/vuln/detail/CVE-2016-2336
title: Type confusion exists in ole_invoke and ole_query_interface
methods of Ruby's WIN32OLE class
date: 2017-01-06
description: |
Type confusion exists in two methods of Ruby's WIN32OLE class,
ole_invoke and ole_query_interface.
Attacker passing different type of object than this assumed by
developers can cause arbitrary code execution.
cvss_v2: 7.5
cvss_v3: 9.8
notes: "Never patched"
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is it really fair to flag all Ruby versions because of a stdlib gem that is not required by default and can only be used on a Windows system? Perhaps this should go into gems/win32ole/?

related:
url:
- https://nvd.nist.gov/vuln/detail/CVE-2016-2336
- http://www.talosintelligence.com/reports/TALOS-2016-0029
- https://github.com/advisories/GHSA-f46g-7w88-2qv4