CVE-2017-17405

Published: 15 December 2017

Ruby before 2.4.3 allows Net::FTP command injection. Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file. If the localfile argument starts with the "|" pipe character, the command following the pipe character is executed. The default value of localfile is File.basename(remotefile), so malicious FTP servers could cause arbitrary command execution.

Priority

Medium

CVSS 3 base score: 8.8

Status

Package Release Status
ruby1.9.1
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 18.04 LTS (Bionic Beaver) Does not exist

Ubuntu 16.04 LTS (Xenial Xerus) Does not exist

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was released [1.9.3.484-2ubuntu1.6])
ruby2.0
Launchpad, Ubuntu, Debian
Upstream Needs triage

Ubuntu 18.04 LTS (Bionic Beaver) Does not exist

Ubuntu 16.04 LTS (Xenial Xerus) Does not exist

Ubuntu 14.04 ESM (Trusty Tahr) Does not exist
(trusty was released [2.0.0.484-1ubuntu2.5])
ruby2.3
Launchpad, Ubuntu, Debian
Upstream
Released (2.3.6)
Ubuntu 18.04 LTS (Bionic Beaver) Not vulnerable
(2.3.6-2)
Ubuntu 16.04 LTS (Xenial Xerus)
Released (2.3.1-2~16.04.4)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist