Rapid7 Vulnerability & Exploit Database

Oracle Linux: CVE-2018-8780: ELSA-2019-2028: ruby security update (MODERATE) (Multiple Advisories)

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Oracle Linux: CVE-2018-8780: ELSA-2019-2028: ruby security update (MODERATE) (Multiple Advisories)

Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:N)
Published
03/28/2018
Created
07/23/2020
Added
07/21/2020
Modified
07/22/2024

Description

In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the Dir.open, Dir.new, Dir.entries and Dir.empty? methods do not check NULL characters. When using the corresponding method, unintentional directory traversal may be performed. It was found that the methods from the Dir class did not properly handle strings containing the NULL byte. An attacker, able to inject NULL bytes in a path, could possibly trigger an unspecified behavior of the ruby script.

Solution(s)

  • oracle-linux-upgrade-ruby
  • oracle-linux-upgrade-ruby-devel
  • oracle-linux-upgrade-ruby-doc
  • oracle-linux-upgrade-rubygem-bigdecimal
  • oracle-linux-upgrade-rubygem-io-console
  • oracle-linux-upgrade-rubygem-json
  • oracle-linux-upgrade-rubygem-minitest
  • oracle-linux-upgrade-rubygem-psych
  • oracle-linux-upgrade-rubygem-rake
  • oracle-linux-upgrade-rubygem-rdoc
  • oracle-linux-upgrade-rubygems
  • oracle-linux-upgrade-rubygems-devel
  • oracle-linux-upgrade-ruby-irb
  • oracle-linux-upgrade-ruby-libs
  • oracle-linux-upgrade-ruby-tcltk

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;