Details for this vulnerability have not been published by NIST at this point. Descriptions from software vendor advisories for this issue are provided below.
From VID-F7FCB75C-E537-11E9-863E-B9B7AF01BA9E:
Ruby news:
This release includes security fixes. Please check the topics below for
details.
CVE-2019-15845: A NUL injection vulnerability of File.fnmatch and
File.fnmatch?
A NUL injection vulnerability of Ruby built-in methods (File.fnmatch
and File.fnmatch?) was found. An attacker who has the control of the
path pattern parameter could exploit this vulnerability to make path
matching pass despite the intention of the program author.
CVE-2019-16201: Regular Expression Denial of Service vulnerability of
WEBrick's Digest access authentication
Regular expression denial of service vulnerability of WEBrick's Digest
authentication module was found. An attacker can exploit this
vulnerability to cause an effective denial of service against a WEBrick
service.
CVE-2019-16254: HTTP response splitting in WEBrick (Additional fix)
There is an HTTP response splitting vulnerability in WEBrick bundled
with Ruby.
CVE-2019-16255: A code injection vulnerability of Shell#[] and
Shell#test
A code injection vulnerability of Shell#[] and Shell#test in a standard
library (lib/shell.rb) was found.
With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.
– Scott Cheney, Manager of Information Security, Sierra View Medical Center