vulnerability
Amazon Linux AMI: CVE-2019-8320: Security patch for ruby20, ruby21, ruby24 (ALAS-2019-1255)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:M/Au:N/C:N/I:C/A:C) | Mar 5, 2019 | Aug 13, 2019 | Apr 16, 2020 |
Severity
9
CVSS
(AV:N/AC:M/Au:N/C:N/I:C/A:C)
Published
Mar 5, 2019
Added
Aug 13, 2019
Modified
Apr 16, 2020
Description
A Directory Traversal issue was discovered in RubyGems 2.7.6 and later through 3.0.2. Before making new directories or touching files (which now include path-checking code for symlinks), it would delete the target destination. If that destination was hidden behind a symlink, a malicious gem could delete arbitrary files on the user's machine, presuming the attacker could guess at paths. Given how frequently gem is run as sudo, and how predictable paths are on modern systems (/tmp, /usr, etc.), this could likely lead to data loss or an unusable system.
Solutions
amazon-linux-upgrade--ruby21amazon-linux-upgrade--ruby24amazon-linux-upgrade-ruby20
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.