CVE-2018-1000074
Published: 13 March 2018
RubyGems version Ruby 2.2 series: 2.2.9 and earlier, Ruby 2.3 series: 2.3.6 and earlier, Ruby 2.4 series: 2.4.3 and earlier, Ruby 2.5 series: 2.5.0 and earlier, prior to trunk revision 62422 contains a Deserialization of Untrusted Data vulnerability in owner command that can result in code execution. This attack appear to be exploitable via victim must run the `gem owner` command on a gem with a specially crafted YAML file. This vulnerability appears to have been fixed in 2.7.6.
From the Ubuntu Security Team
It was discovered that the RubyGems embedded in JRuby would deserialize unsafe objects in untrusted YAML. If a user were tricked into using the `gem owner` command on a malicious ruby gem, JRuby could execute a malicious payload.
Notes
Author | Note |
---|---|
tyhicks | ruby{1.9.1,2.0,2.3} and jruby ship an embedded rubygems. |
Priority
Status
Package | Release | Status |
---|---|---|
jruby Launchpad, Ubuntu, Debian |
artful |
Ignored
(reached end-of-life)
|
bionic |
Needs triage
|
|
cosmic |
Ignored
(reached end-of-life)
|
|
disco |
Not vulnerable
(9.1.17.0-2)
|
|
eoan |
Not vulnerable
(9.1.17.0-3)
|
|
focal |
Not vulnerable
(9.1.17.0-3)
|
|
groovy |
Not vulnerable
(9.1.17.0-3)
|
|
hirsute |
Not vulnerable
(9.1.17.0-3)
|
|
impish |
Not vulnerable
(9.1.17.0-3)
|
|
precise |
Does not exist
|
|
trusty |
Released
(1.5.6-9+deb8u2build0.14.04.1~esm2)
|
|
upstream |
Needs triage
|
|
xenial |
Needs triage
|
|
ruby1.9.1 Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
bionic |
Does not exist
|
|
cosmic |
Does not exist
|
|
disco |
Does not exist
|
|
eoan |
Does not exist
|
|
focal |
Does not exist
|
|
groovy |
Does not exist
|
|
hirsute |
Does not exist
|
|
impish |
Does not exist
|
|
jammy |
Does not exist
|
|
kinetic |
Does not exist
|
|
precise |
Does not exist
|
|
trusty |
Does not exist
(trusty was released [1.9.3.484-2ubuntu1.12])
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
|
ruby2.0 Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
bionic |
Does not exist
|
|
cosmic |
Does not exist
|
|
disco |
Does not exist
|
|
eoan |
Does not exist
|
|
focal |
Does not exist
|
|
groovy |
Does not exist
|
|
hirsute |
Does not exist
|
|
impish |
Does not exist
|
|
jammy |
Does not exist
|
|
kinetic |
Does not exist
|
|
precise |
Does not exist
|
|
trusty |
Does not exist
(trusty was released [2.0.0.484-1ubuntu2.10])
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
|
ruby2.1 Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
bionic |
Does not exist
|
|
cosmic |
Does not exist
|
|
disco |
Does not exist
|
|
eoan |
Does not exist
|
|
focal |
Does not exist
|
|
groovy |
Does not exist
|
|
hirsute |
Does not exist
|
|
impish |
Does not exist
|
|
jammy |
Does not exist
|
|
kinetic |
Does not exist
|
|
precise |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
|
ruby2.3 Launchpad, Ubuntu, Debian |
artful |
Released
(2.3.3-1ubuntu1.4)
|
bionic |
Does not exist
|
|
cosmic |
Does not exist
|
|
disco |
Does not exist
|
|
eoan |
Does not exist
|
|
focal |
Does not exist
|
|
groovy |
Does not exist
|
|
hirsute |
Does not exist
|
|
impish |
Does not exist
|
|
jammy |
Does not exist
|
|
kinetic |
Does not exist
|
|
precise |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Released
(2.3.1-2~16.04.7)
|
|
ruby2.5 Launchpad, Ubuntu, Debian |
artful |
Does not exist
|
bionic |
Released
(2.5.1-1)
|
|
cosmic |
Released
(2.5.1-1)
|
|
disco |
Released
(2.5.1-1)
|
|
eoan |
Released
(2.5.1-1)
|
|
focal |
Does not exist
|
|
groovy |
Does not exist
|
|
hirsute |
Does not exist
|
|
impish |
Does not exist
|
|
jammy |
Does not exist
|
|
kinetic |
Does not exist
|
|
precise |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.8 |
Attack vector | Local |
Attack complexity | Low |
Privileges required | None |
User interaction | Required |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | High |
Availability impact | High |
Vector | CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000074
- https://github.com/rubygems/rubygems/commit/254e3d0ee873c008c0b74e8b8abcbdab4caa0a6d
- https://www.ruby-lang.org/en/news/2018/02/17/multiple-vulnerabilities-in-rubygems/
- https://ubuntu.com/security/notices/USN-3621-1
- https://ubuntu.com/security/notices/USN-3621-2
- https://ubuntu.com/security/notices/USN-3685-1
- NVD
- Launchpad
- Debian