FKIE_CVE-2017-10784
Vulnerability from fkie_nvd - Published: 2017-09-19 17:29 - Updated: 2025-04-20 01:37
Severity ?
Summary
The Basic authentication code in WEBrick library in Ruby before 2.2.8, 2.3.x before 2.3.5, and 2.4.x through 2.4.1 allows remote attackers to inject terminal emulator escape sequences into its log and possibly execute arbitrary commands via a crafted user name.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| ruby-lang | ruby | * | |
| ruby-lang | ruby | 2.3.0 | |
| ruby-lang | ruby | 2.3.0 | |
| ruby-lang | ruby | 2.3.0 | |
| ruby-lang | ruby | 2.3.1 | |
| ruby-lang | ruby | 2.3.2 | |
| ruby-lang | ruby | 2.3.3 | |
| ruby-lang | ruby | 2.3.4 | |
| ruby-lang | ruby | 2.4.0 | |
| ruby-lang | ruby | 2.4.0 | |
| ruby-lang | ruby | 2.4.0 | |
| ruby-lang | ruby | 2.4.0 | |
| ruby-lang | ruby | 2.4.0 | |
| ruby-lang | ruby | 2.4.1 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*",
"matchCriteriaId": "20D4B423-C141-4B08-9FE4-2ADCB868A224",
"versionEndIncluding": "2.2.7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:2.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "822307DD-7F7D-44C2-9C4B-CB8704663410",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:2.3.0:preview1:*:*:*:*:*:*",
"matchCriteriaId": "A2D62AC9-83B8-4C84-A47E-2B06C2816964",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:2.3.0:preview2:*:*:*:*:*:*",
"matchCriteriaId": "E583E49C-95B1-4AE4-AA7A-6D6BA7D470B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5F197C5A-2588-417F-A743-E72D1E8EF4F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:2.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FBA01BF1-91AD-4968-9AC2-A194FCD6AB76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:2.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B36CCD91-2A20-4C2E-96D5-73704DFC10E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:2.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "485C401C-CC3B-4A74-82D6-F4539FFE48B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F9E99F5A-E693-43E9-8AB3-A3FCB21BCF14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:2.4.0:preview1:*:*:*:*:*:*",
"matchCriteriaId": "9DDA92E9-C9CF-47B9-B647-0202D493D057",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:2.4.0:preview2:*:*:*:*:*:*",
"matchCriteriaId": "A682A487-A615-404C-A7D9-A28C0C31B4E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:2.4.0:preview3:*:*:*:*:*:*",
"matchCriteriaId": "8930BA64-E9BC-42E0-9D74-8FA2ABD1F692",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:2.4.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "A87AE96A-F7FB-41A2-943C-DFAEA6D81446",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ruby-lang:ruby:2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "946D2AB0-D334-4D94-BDA2-733BFC6C9E1E",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The Basic authentication code in WEBrick library in Ruby before 2.2.8, 2.3.x before 2.3.5, and 2.4.x through 2.4.1 allows remote attackers to inject terminal emulator escape sequences into its log and possibly execute arbitrary commands via a crafted user name."
},
{
"lang": "es",
"value": "El c\u00f3digo de autenticaci\u00f3n Basic en la biblioteca WEBrick en Ruby en versiones anteriores a la 2.2.8, 2.3.x anteriores a la 2.3.5 y 2.4.x hasta la 2.4.1 permite que atacantes remotos inyecten secuencias de escape del emulador del terminal en su registro y que puedan ejecutar comandos arbitrarios mediante un nombre de usuario manipulado."
}
],
"id": "CVE-2017-10784",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 9.3,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-09-19T17:29:00.263",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/100853"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1039363"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id/1042004"
},
{
"source": "cve@mitre.org",
"url": "https://access.redhat.com/errata/RHSA-2017:3485"
},
{
"source": "cve@mitre.org",
"url": "https://access.redhat.com/errata/RHSA-2018:0378"
},
{
"source": "cve@mitre.org",
"url": "https://access.redhat.com/errata/RHSA-2018:0583"
},
{
"source": "cve@mitre.org",
"url": "https://access.redhat.com/errata/RHSA-2018:0585"
},
{
"source": "cve@mitre.org",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html"
},
{
"source": "cve@mitre.org",
"url": "https://security.gentoo.org/glsa/201710-18"
},
{
"source": "cve@mitre.org",
"url": "https://usn.ubuntu.com/3528-1/"
},
{
"source": "cve@mitre.org",
"url": "https://usn.ubuntu.com/3685-1/"
},
{
"source": "cve@mitre.org",
"url": "https://www.debian.org/security/2017/dsa-4031"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-2-8-released/"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-3-5-released/"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.ruby-lang.org/en/news/2017/09/14/webrick-basic-auth-escape-sequence-injection-cve-2017-10784/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/100853"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1039363"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id/1042004"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2017:3485"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2018:0378"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2018:0583"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2018:0585"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.gentoo.org/glsa/201710-18"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://usn.ubuntu.com/3528-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://usn.ubuntu.com/3685-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://www.debian.org/security/2017/dsa-4031"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-2-8-released/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.ruby-lang.org/en/news/2017/09/14/ruby-2-3-5-released/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.ruby-lang.org/en/news/2017/09/14/webrick-basic-auth-escape-sequence-injection-cve-2017-10784/"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-287"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…