tt9133github / ForTest2

0 stars 0 forks source link

CVE-2021-31799 (High) detected in rdoc-6.2.1.gem #405

Open mend-bolt-for-github[bot] opened 3 months ago

mend-bolt-for-github[bot] commented 3 months ago

CVE-2021-31799 - High Severity Vulnerability

Vulnerable Library - rdoc-6.2.1.gem

RDoc produces HTML and command-line documentation for Ruby projects. RDoc includes the +rdoc+ and +ri+ tools for generating and displaying documentation from the command-line.

Library home page: https://rubygems.org/gems/rdoc-6.2.1.gem

Path to vulnerable library: /nges/vendor/bundle/ruby/2.5.0/cache/rdoc-6.2.1.gem,/ependencies/vendor/bundle/ruby/2.5.0/cache/rdoc-6.2.1.gem

Dependency Hierarchy: - :x: **rdoc-6.2.1.gem** (Vulnerable Library)

Found in HEAD commit: 27e1f740a162e55490d9ca929f243afbaa92476c

Found in base branch: master

Vulnerability Details

In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby through 3.0.1, it is possible to execute arbitrary code via | and tags in a filename.

Publish Date: 2021-07-30

URL: CVE-2021-31799

CVSS 3 Score Details (7.0)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Local - Attack Complexity: High - Privileges Required: Low - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://www.ruby-lang.org/en/news/2021/05/02/os-command-injection-in-rdoc/

Release Date: 2021-07-30

Fix Resolution: rdoc - 6.3.1


Step up your Open Source Security Game with Mend here