WID-SEC-W-2023-1110
Vulnerability from csaf_certbund - Published: 2019-10-01 22:00 - Updated: 2024-03-04 23:00Es existiert eine Schwachstelle in Ruby. Diese besteht aufgrund einer unsachgemäßen Behandlung von Pfadmustern in den Methoden File.fnmatch und File.fnmatch?. Ein Angreifer kann diese Schwachstelle ausnutzen, um Sicherheitsmechanismen zu umgehen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Ruby 2.5.7
Open Source / Ruby
|
cpe:/a:ruby-lang:ruby:2.5.7
|
2.5.7 | |
|
Open Source Ruby 2.4.8
Open Source / Ruby
|
cpe:/a:ruby-lang:ruby:2.4.8
|
2.4.8 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Open Source Arch Linux
Open Source
|
cpe:/o:archlinux:archlinux:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Open Source Ruby 2.6.5
Open Source / Ruby
|
cpe:/a:ruby-lang:ruby:2.6.5
|
2.6.5 |
Es existiert eine Schwachstelle in Ruby. Eine unsachgemäße Verarbeitung von regulären Ausdrücken im WEBrick Digest-Authentifizierungsmodul ist die Ursache dieser Schwachstelle. Ein entfernter anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Ruby 2.5.7
Open Source / Ruby
|
cpe:/a:ruby-lang:ruby:2.5.7
|
2.5.7 | |
|
Open Source Ruby 2.4.8
Open Source / Ruby
|
cpe:/a:ruby-lang:ruby:2.4.8
|
2.4.8 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Open Source Arch Linux
Open Source
|
cpe:/o:archlinux:archlinux:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Open Source Ruby 2.6.5
Open Source / Ruby
|
cpe:/a:ruby-lang:ruby:2.6.5
|
2.6.5 |
Es existiert eine Schwachstelle in Ruby. Hier handelt es sich um eine HTTP-Response-Splitting-Schwachstelle in WEBrick. Ein entfernter anonymer Angreifer kann das ausnutzen, um Zeilenumbruchzeichen einzufügen, um einen Header zu teilen, und bösartigen Inhalt einzufügen, um Clients zu täuschen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Ruby 2.5.7
Open Source / Ruby
|
cpe:/a:ruby-lang:ruby:2.5.7
|
2.5.7 | |
|
Open Source Ruby 2.4.8
Open Source / Ruby
|
cpe:/a:ruby-lang:ruby:2.4.8
|
2.4.8 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Open Source Arch Linux
Open Source
|
cpe:/o:archlinux:archlinux:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Open Source Ruby 2.6.5
Open Source / Ruby
|
cpe:/a:ruby-lang:ruby:2.6.5
|
2.6.5 |
Es existiert eine Schwachstelle in Ruby. "Shell#[]" und sein in [lib/shell.rb] definierter Alias "Shell#test" erlauben eine Codeinjektion, wenn das erste Argument ("command") nicht vertrauenswürdige Daten enthält. Ein Angreifer kann dies ausnutzen, um eine beliebige RUBY-Methode aufzurufen.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
Open Source Ruby 2.5.7
Open Source / Ruby
|
cpe:/a:ruby-lang:ruby:2.5.7
|
2.5.7 | |
|
Open Source Ruby 2.4.8
Open Source / Ruby
|
cpe:/a:ruby-lang:ruby:2.4.8
|
2.4.8 | |
|
Debian Linux
Debian
|
cpe:/o:debian:debian_linux:-
|
— | |
|
SUSE Linux
SUSE
|
cpe:/o:suse:suse_linux:-
|
— | |
|
Red Hat Enterprise Linux
Red Hat
|
cpe:/o:redhat:enterprise_linux:-
|
— | |
|
Ubuntu Linux
Ubuntu
|
cpe:/o:canonical:ubuntu_linux:-
|
— | |
|
Open Source Arch Linux
Open Source
|
cpe:/o:archlinux:archlinux:-
|
— | |
|
Amazon Linux 2
Amazon
|
cpe:/o:amazon:linux_2:-
|
— | |
|
Oracle Linux
Oracle
|
cpe:/o:oracle:linux:-
|
— | |
|
Open Source Ruby 2.6.5
Open Source / Ruby
|
cpe:/a:ruby-lang:ruby:2.6.5
|
2.6.5 |
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Ruby ist eine interpretierte, objektorientierte Skriptsprache.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Ruby ausnutzen, um Sicherheitsvorkehrungen zu umgehen, um Daten zu manipulieren oder einen Denial of Servie zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- UNIX\n- Linux\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-1110 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2019/wid-sec-w-2023-1110.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-1110 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1110"
},
{
"category": "external",
"summary": "Ruby Release Notes vom 2019-10-01",
"url": "https://www.ruby-lang.org/en/news/2019/10/01/ruby-2-4-8-released/"
},
{
"category": "external",
"summary": "Ruby Release Notes vom 2019-10-01",
"url": "https://www.ruby-lang.org/en/news/2019/10/01/ruby-2-5-7-released/"
},
{
"category": "external",
"summary": "Ruby Release Notes vom 2019-10-01",
"url": "https://www.ruby-lang.org/en/news/2019/10/01/ruby-2-6-5-released/"
},
{
"category": "external",
"summary": "Ruby Release Notes vom 2019-10-01",
"url": "https://www.ruby-lang.org/en/news/2019/10/02/ruby-2-4-9-released/"
},
{
"category": "external",
"summary": "Arch Linux Security Advisory ASA-201910-5 vom 2019-10-02",
"url": "https://security.archlinux.org/ASA-201910-5"
},
{
"category": "external",
"summary": "Arch Linux Security Advisory ASA-201910-2 vom 2019-10-02",
"url": "https://security.archlinux.org/ASA-201910-2"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-4201-1 vom 2019-11-26",
"url": "https://usn.ubuntu.com/4201-1/"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4587 vom 2019-12-17",
"url": "http://seclists.org/bugtraq/2019/Dec/31"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4586 vom 2019-12-17",
"url": "http://seclists.org/bugtraq/2019/Dec/32"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:0737-1 vom 2020-03-20",
"url": "https://www.suse.com/support/update/announcement/2020/suse-su-20200737-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2020:1570-1 vom 2020-06-09",
"url": "http://lists.suse.com/pipermail/sle-security-updates/2020-June/006905.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-2330 vom 2020-08-16",
"url": "https://lists.debian.org/debian-lts-announce/2020/debian-lts-announce-202008/msg00027.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:2104 vom 2021-05-25",
"url": "https://access.redhat.com/errata/RHSA-2021:2104"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:2230 vom 2021-06-03",
"url": "https://access.redhat.com/errata/RHSA-2021:2230"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:2587 vom 2021-06-29",
"url": "https://access.redhat.com/errata/RHSA-2021:2587"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:2588 vom 2021-06-29",
"url": "https://access.redhat.com/errata/RHSA-2021:2588"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2021-2587 vom 2021-07-02",
"url": "https://linux.oracle.com/errata/ELSA-2021-2587.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2021-2588 vom 2021-07-08",
"url": "http://linux.oracle.com/errata/ELSA-2021-2588.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:0582 vom 2022-02-21",
"url": "https://access.redhat.com/errata/RHSA-2022:0582"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2022:0581 vom 2022-02-21",
"url": "https://access.redhat.com/errata/RHSA-2022:0581"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3408 vom 2023-04-30",
"url": "https://lists.debian.org/debian-lts-announce/2023/04/msg00033.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASRUBY2.6-2023-007 vom 2023-09-27",
"url": "https://alas.aws.amazon.com/AL2/ALASRUBY2.6-2023-007.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2024-2486 vom 2024-03-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2486.html"
}
],
"source_lang": "en-US",
"title": "Ruby: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-03-04T23:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:50:10.553+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-1110",
"initial_release_date": "2019-10-01T22:00:00.000+00:00",
"revision_history": [
{
"date": "2019-10-01T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2019-10-03T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Arch Linux aufgenommen"
},
{
"date": "2019-11-26T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2019-12-16T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2020-01-01T23:00:00.000+00:00",
"number": "5",
"summary": "Referenz(en) aufgenommen: DLA 2027"
},
{
"date": "2020-03-22T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-06-09T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2020-08-16T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2021-05-25T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-06-03T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-06-29T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-07-01T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2021-07-07T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2022-02-20T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-05-01T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2023-09-27T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-03-04T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Amazon aufgenommen"
}
],
"status": "final",
"version": "17"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Arch Linux",
"product": {
"name": "Open Source Arch Linux",
"product_id": "T013312",
"product_identification_helper": {
"cpe": "cpe:/o:archlinux:archlinux:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "2.4.8",
"product": {
"name": "Open Source Ruby 2.4.8",
"product_id": "T015075",
"product_identification_helper": {
"cpe": "cpe:/a:ruby-lang:ruby:2.4.8"
}
}
},
{
"category": "product_version",
"name": "2.5.7",
"product": {
"name": "Open Source Ruby 2.5.7",
"product_id": "T015076",
"product_identification_helper": {
"cpe": "cpe:/a:ruby-lang:ruby:2.5.7"
}
}
},
{
"category": "product_version",
"name": "2.6.5",
"product": {
"name": "Open Source Ruby 2.6.5",
"product_id": "T015077",
"product_identification_helper": {
"cpe": "cpe:/a:ruby-lang:ruby:2.6.5"
}
}
}
],
"category": "product_name",
"name": "Ruby"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-15845",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in Ruby. Diese besteht aufgrund einer unsachgem\u00e4\u00dfen Behandlung von Pfadmustern in den Methoden File.fnmatch und File.fnmatch?. Ein Angreifer kann diese Schwachstelle ausnutzen, um Sicherheitsmechanismen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T015076",
"T015075",
"2951",
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T004914",
"T015077"
]
},
"release_date": "2019-10-01T22:00:00.000+00:00",
"title": "CVE-2019-15845"
},
{
"cve": "CVE-2019-16201",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in Ruby. Eine unsachgem\u00e4\u00dfe Verarbeitung von regul\u00e4ren Ausdr\u00fccken im WEBrick Digest-Authentifizierungsmodul ist die Ursache dieser Schwachstelle. Ein entfernter anonymer Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen."
}
],
"product_status": {
"known_affected": [
"T015076",
"T015075",
"2951",
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T004914",
"T015077"
]
},
"release_date": "2019-10-01T22:00:00.000+00:00",
"title": "CVE-2019-16201"
},
{
"cve": "CVE-2019-16254",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in Ruby. Hier handelt es sich um eine HTTP-Response-Splitting-Schwachstelle in WEBrick. Ein entfernter anonymer Angreifer kann das ausnutzen, um Zeilenumbruchzeichen einzuf\u00fcgen, um einen Header zu teilen, und b\u00f6sartigen Inhalt einzuf\u00fcgen, um Clients zu t\u00e4uschen."
}
],
"product_status": {
"known_affected": [
"T015076",
"T015075",
"2951",
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T004914",
"T015077"
]
},
"release_date": "2019-10-01T22:00:00.000+00:00",
"title": "CVE-2019-16254"
},
{
"cve": "CVE-2019-16255",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in Ruby. \"Shell#[]\" und sein in [lib/shell.rb] definierter Alias \"Shell#test\" erlauben eine Codeinjektion, wenn das erste Argument (\"command\") nicht vertrauensw\u00fcrdige Daten enth\u00e4lt. Ein Angreifer kann dies ausnutzen, um eine beliebige RUBY-Methode aufzurufen."
}
],
"product_status": {
"known_affected": [
"T015076",
"T015075",
"2951",
"T002207",
"67646",
"T000126",
"T013312",
"398363",
"T004914",
"T015077"
]
},
"release_date": "2019-10-01T22:00:00.000+00:00",
"title": "CVE-2019-16255"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.