-
-
Notifications
You must be signed in to change notification settings - Fork 227
GHSA SYNC: 1 brand new unreviewed advisories #969
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,32 @@ | ||
| --- | ||
| engine: ruby | ||
| cve: 2011-3624 | ||
| ghsa: rc82-v3mm-rhj2 | ||
| url: https://nvd.nist.gov/vuln/detail/CVE-2011-3624 | ||
| title: Various methods in WEBrick::HTTPRequest in Ruby 1.9.2 and 1.8.7 | ||
| date: 2019-11-25 | ||
| description: | | ||
| Various methods in WEBrick::HTTPRequest in Ruby | ||
| 1.9.2-p290 and 1.8.7-p352 and earlier do not validate the | ||
| X-Forwarded-For, X-Forwarded-Host and X-Forwarded-Server headers in | ||
| requests, which might allow remote attackers to inject arbitrary text | ||
| into log files or bypass intended address parsing via a crafted header. | ||
|
|
||
| ## Can only have one "notes:" field for adding these notes here: | ||
| - https://redmine.ruby-lang.org/issues/5418 mentioned CVE-2011-3187 | ||
| - https://webservsec.blogspot.com/2011/02/ruby-on-rails-vulnerability.html | ||
| - https://redmine.ruby-lang.org/issues/5418 says: | ||
| - "WEBrick has been removed from ruby repository. If anyone interest | ||
| this, Please file this to https://github.com/ruby/webrick" | ||
| - Unclear when or if this was patched. | ||
| cvss_v2: 5.0 | ||
| cvss_v3: 5.3 | ||
| notes: Never patched | ||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Is this is still unpatched? Also, WEBrick was moved out of Ruby and into a separate gem as of Ruby 3.0.0. I feel like |
||
| related: | ||
| url: | ||
| - https://nvd.nist.gov/vuln/detail/CVE-2011-3624 | ||
| - https://access.redhat.com/security/cve/cve-2011-3624 | ||
| - https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3624 | ||
| - https://security-tracker.debian.org/tracker/CVE-2011-3624 | ||
| - https://github.com/ruby/webrick | ||
| - https://github.com/advisories/GHSA-rc82-v3mm-rhj2 | ||
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,21 @@ | ||
| --- | ||
| engine: ruby | ||
| cve: 2016-2336 | ||
| ghsa: f46g-7w88-2qv4 | ||
| url: https://nvd.nist.gov/vuln/detail/CVE-2016-2336 | ||
| title: Type confusion exists in ole_invoke and ole_query_interface | ||
| methods of Ruby's WIN32OLE class | ||
| date: 2017-01-06 | ||
| description: | | ||
| Type confusion exists in two methods of Ruby's WIN32OLE class, | ||
| ole_invoke and ole_query_interface. | ||
| Attacker passing different type of object than this assumed by | ||
| developers can cause arbitrary code execution. | ||
| cvss_v2: 7.5 | ||
| cvss_v3: 9.8 | ||
| notes: "Never patched" | ||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Is it really fair to flag all Ruby versions because of a stdlib gem that is not required by default and can only be used on a Windows system? Perhaps this should go into |
||
| related: | ||
| url: | ||
| - https://nvd.nist.gov/vuln/detail/CVE-2016-2336 | ||
| - http://www.talosintelligence.com/reports/TALOS-2016-0029 | ||
| - https://github.com/advisories/GHSA-f46g-7w88-2qv4 | ||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
notes:is free form text. This additional information should be put intonotes:. The additional URLs can also be added to the related urls list.