GSD-2017-7540
Vulnerability from gsd - Updated: 2017-04-05 00:00Details
Safemode, as used in Foreman, versions 1.3.2 and earlier are vulnerable
to bypassing safe mode limitations via special Ruby syntax. This can
lead to deletion of objects for which the user does not have delete
permissions or possibly to privilege escalation.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2017-7540",
"description": "rubygem-safemode, as used in Foreman, versions 1.3.2 and earlier are vulnerable to bypassing safe mode limitations via special Ruby syntax. This can lead to deletion of objects for which the user does not have delete permissions or possibly to privilege escalation.",
"id": "GSD-2017-7540"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"affected": [
{
"package": {
"ecosystem": "RubyGems",
"name": "safemode",
"purl": "pkg:gem/safemode"
}
}
],
"aliases": [
"CVE-2017-7540",
"GHSA-5vx5-9q73-wgp4"
],
"details": "Safemode, as used in Foreman, versions 1.3.2 and earlier are vulnerable\nto bypassing safe mode limitations via special Ruby syntax. This can\nlead to deletion of objects for which the user does not have delete\npermissions or possibly to privilege escalation.\n",
"id": "GSD-2017-7540",
"modified": "2017-04-05T00:00:00.000Z",
"published": "2017-04-05T00:00:00.000Z",
"references": [
{
"type": "WEB",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7540"
},
{
"type": "WEB",
"url": "https://github.com/svenfuchs/safemode/pull/23"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": 9.8,
"type": "CVSS_V3"
}
],
"summary": "Safemode Gem for Ruby is vulnerable to bypassing safe mode limitations"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2017-7540",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "rubygem-safemode",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "1.3.2 and earlier"
}
]
}
}
]
},
"vendor_name": "Red Hat, Inc."
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "rubygem-safemode, as used in Foreman, versions 1.3.2 and earlier are vulnerable to bypassing safe mode limitations via special Ruby syntax. This can lead to deletion of objects for which the user does not have delete permissions or possibly to privilege escalation."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"cweId": "CWE-184",
"lang": "eng",
"value": "CWE-184"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/svenfuchs/safemode/pull/23",
"refsource": "MISC",
"url": "https://github.com/svenfuchs/safemode/pull/23"
}
]
}
},
"github.com/rubysec/ruby-advisory-db": {
"cve": "2017-7540",
"cvss_v3": 9.8,
"date": "2017-04-05",
"description": "Safemode, as used in Foreman, versions 1.3.2 and earlier are vulnerable\nto bypassing safe mode limitations via special Ruby syntax. This can\nlead to deletion of objects for which the user does not have delete\npermissions or possibly to privilege escalation.\n",
"gem": "safemode",
"ghsa": "5vx5-9q73-wgp4",
"patched_versions": [
"\u003e= 1.3.3"
],
"related": {
"url": [
"https://github.com/svenfuchs/safemode/pull/23"
]
},
"title": "Safemode Gem for Ruby is vulnerable to bypassing safe mode limitations",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7540"
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003c1.3.4",
"affected_versions": "All versions before 1.3.4",
"cvss_v2": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"cvss_v3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"cwe_ids": [
"CWE-1035",
"CWE-937"
],
"date": "2019-10-09",
"description": "Safemode is vulnerable to bypassing safe mode limitations via special Ruby syntax. This can lead to deletion of objects for which the user does not have delete-permissions or possibly to privilege escalation.",
"fixed_versions": [
"1.3.4"
],
"identifier": "CVE-2017-7540",
"identifiers": [
"CVE-2017-7540"
],
"not_impacted": "All versions starting from 1.3.4",
"package_slug": "gem/safemode",
"pubdate": "2017-07-21",
"solution": "Upgrade to version 1.3.4 or above.",
"title": "Safe mode bypassing",
"urls": [
"https://github.com/svenfuchs/safemode/pull/23"
],
"uuid": "b78203b5-af1b-466a-8e77-e146715e5944"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:safemode_project:safemode:*:*:*:*:*:ruby:*:*",
"cpe_name": [],
"versionEndIncluding": "1.3.2",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2017-7540"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "rubygem-safemode, as used in Foreman, versions 1.3.2 and earlier are vulnerable to bypassing safe mode limitations via special Ruby syntax. This can lead to deletion of objects for which the user does not have delete permissions or possibly to privilege escalation."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/svenfuchs/safemode/pull/23",
"refsource": "MISC",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/svenfuchs/safemode/pull/23"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
},
"lastModifiedDate": "2019-10-09T23:29Z",
"publishedDate": "2017-07-21T22:29Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…