vulnerability
Amazon Linux AMI 2: CVE-2020-10663: Security patch for ruby (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:L/Au:N/C:N/I:P/A:N) | Apr 28, 2020 | May 26, 2021 | Nov 26, 2024 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
Apr 28, 2020
Added
May 26, 2021
Modified
Nov 26, 2024
Description
The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulnerability. This is quite similar to CVE-2013-0269, but does not rely on poor garbage-collection behavior within Ruby. Specifically, use of JSON parsing methods can lead to creation of a malicious object within the interpreter, with adverse effects that are application-dependent.
Solution(s)
amazon-linux-ami-2-upgrade-rubyamazon-linux-ami-2-upgrade-ruby-debuginfoamazon-linux-ami-2-upgrade-ruby-develamazon-linux-ami-2-upgrade-ruby-docamazon-linux-ami-2-upgrade-ruby-irbamazon-linux-ami-2-upgrade-ruby-libsamazon-linux-ami-2-upgrade-ruby-tcltkamazon-linux-ami-2-upgrade-rubygem-bigdecimalamazon-linux-ami-2-upgrade-rubygem-bundleramazon-linux-ami-2-upgrade-rubygem-did_you_meanamazon-linux-ami-2-upgrade-rubygem-io-consoleamazon-linux-ami-2-upgrade-rubygem-irbamazon-linux-ami-2-upgrade-rubygem-jsonamazon-linux-ami-2-upgrade-rubygem-minitestamazon-linux-ami-2-upgrade-rubygem-net-telnetamazon-linux-ami-2-upgrade-rubygem-opensslamazon-linux-ami-2-upgrade-rubygem-power_assertamazon-linux-ami-2-upgrade-rubygem-psychamazon-linux-ami-2-upgrade-rubygem-rakeamazon-linux-ami-2-upgrade-rubygem-rdocamazon-linux-ami-2-upgrade-rubygem-test-unitamazon-linux-ami-2-upgrade-rubygem-xmlrpcamazon-linux-ami-2-upgrade-rubygemsamazon-linux-ami-2-upgrade-rubygems-devel

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.