跳转到帖子

Oracle Linux: CVE-2024-27281: ELSA-2024-3668: ruby:3.1 security, bug fix, and enhancement update (MODERATE) (Multiple Advisories)

recommended_posts

发布于
  • Members

Oracle Linux: CVE-2024-27281: ELSA-2024-3668:ruby:3.1 security, bug fix, and enhancement update (MODERATE) (Multiple Advisories)

Severity
4
CVSS
(AV:L/AC:H/Au:N/C:P/I:P/A:P)
Published
03/21/2024
Created
06/04/2024
Added
06/01/2024
Modified
01/08/2025

Description

An issue was discovered in RDoc 6.3.3 through 6.6.2, as distributed in Ruby 3.x through 3.3.0. When parsing .rdoc_options (used for configuration in RDoc) as a YAML file, object injection and resultant remote code execution are possible because there are no restrictions on the classes that can be restored. (When loading the documentation cache, object injection and resultant remote code execution are also possible if there were a crafted cache.) The main fixed version is 6.6.3.1. For Ruby 3.0 users, a fixed version is rdoc 6.3.4.1. For Ruby 3.1 users, a fixed version is rdoc 6.4.1.1. For Ruby 3.2 users, a fixed version is rdoc 6.5.1.1. A flaw was found in Rubygem RDoc. When parsing .rdoc_options used for configuration in RDoc as a YAML file there are no restrictions on the classes that can be restored. This issue may lead to object injection, resulting in remote code execution.

Solution(s)

  • oracle-linux-upgrade-ruby
  • oracle-linux-upgrade-ruby-bundled-gems
  • oracle-linux-upgrade-ruby-default-gems
  • oracle-linux-upgrade-ruby-devel
  • oracle-linux-upgrade-ruby-doc
  • oracle-linux-upgrade-rubygem-abrt
  • oracle-linux-upgrade-rubygem-abrt-doc
  • oracle-linux-upgrade-rubygem-bigdecimal
  • oracle-linux-upgrade-rubygem-bson
  • oracle-linux-upgrade-rubygem-bson-doc
  • oracle-linux-upgrade-rubygem-bundler
  • oracle-linux-upgrade-rubygem-bundler-doc
  • oracle-linux-upgrade-rubygem-did-you-mean
  • oracle-linux-upgrade-rubygem-io-console
  • oracle-linux-upgrade-rubygem-irb
  • oracle-linux-upgrade-rubygem-json
  • oracle-linux-upgrade-rubygem-minitest
  • oracle-linux-upgrade-rubygem-mongo
  • oracle-linux-upgrade-rubygem-mongo-doc
  • oracle-linux-upgrade-rubygem-mysql2
  • oracle-linux-upgrade-rubygem-mysql2-doc
  • oracle-linux-upgrade-rubygem-net-telnet
  • oracle-linux-upgrade-rubygem-openssl
  • oracle-linux-upgrade-rubygem-pg
  • oracle-linux-upgrade-rubygem-pg-doc
  • oracle-linux-upgrade-rubygem-power-assert
  • oracle-linux-upgrade-rubygem-psych
  • oracle-linux-upgrade-rubygem-racc
  • oracle-linux-upgrade-rubygem-rake
  • oracle-linux-upgrade-rubygem-rbs
  • oracle-linux-upgrade-rubygem-rdoc
  • oracle-linux-upgrade-rubygem-rexml
  • oracle-linux-upgrade-rubygem-rss
  • oracle-linux-upgrade-rubygems
  • oracle-linux-upgrade-rubygems-devel
  • oracle-linux-upgrade-rubygem-test-unit
  • oracle-linux-upgrade-rubygem-typeprof
  • oracle-linux-upgrade-rubygem-xmlrpc
  • oracle-linux-upgrade-ruby-irb
  • oracle-linux-upgrade-ruby-libs

References

  • https://attackerkb.com/topics/cve-2024-27281
  • CVE - 2024-27281
  • ELSA-2024-3668
  • ELSA-2024-3671
  • ELSA-2024-4499
  • ELSA-2024-3500
  • ELSA-2024-3546
  • ELSA-2024-3670
  • ELSA-2024-3838
View more
  • 查看数 704
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…