26 results (0.005 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

RubyGems.org is the Ruby community gem host. A bug in password & email change confirmation code allowed an attacker to change their RubyGems.org account's email to an unowned email address. Having access to an account whose email has been changed could enable an attacker to save API keys for that account, and when a legitimate user attempts to create an account with their email (and has to reset password to gain access) and is granted access to other gems, the attacker would then be able to publish and yank versions of those gems. Commit number 90c9e6aac2d91518b479c51d48275c57de492d4d contains a patch for this issue. RubyGems.org es el host de gemas de la comunidad Ruby. • https://github.com/rubygems/rubygems.org/commit/90c9e6aac2d91518b479c51d48275c57de492d4d https://github.com/rubygems/rubygems.org/security/advisories/GHSA-8qpf-wf2p-25vg • CWE-287: Improper Authentication •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::UserInteraction#verbose calls say without escaping, escape sequence injection is possible. Se descubrió un error en RubyGems 2.6 y más tarde hasta 3.0.2. hasta Gem::UserInteraction#verbose Dado que las llamadas verbales Gem :: UserInteraction # verbose dicen que sin escape, la inyección de secuencia de escape es posible • http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html https://hackerone.com/reports/317330 https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html https://access.redhat.com/security/cve/CVE-2019-8321 https://bugzilla.redhat.com/show_bug.cgi?id=1692514 • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

An issue was discovered in RubyGems 2.6 and later through 3.0.2. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur. Se descubrió un error en RubyGems 2.6 y mucho más tarde hasta 3.0.2 El comando de propietario de gemas envía el contenido de la respuesta de la API directamente a la salida estándar. Por lo tanto, si la respuesta es elaborada, puede ocurrir una inyección de secuencia de escape. • http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html https://hackerone.com/reports/315087 https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html https://access.redhat.com/security/cve/CVE-2019-8322 https://bugzilla.redhat.com/show_bug.cgi?id=1692516 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

An issue was discovered in RubyGems 2.6 and later through 3.0.2. Gem::GemcutterUtilities#with_response may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur. Se descubrió un error in RubyGems 2.6 y posteriormente hasta 3.0.2 Gem::GemcutterUtilities#with La respuesta puede generar la respuesta de la API a stdout tal como está. Por lo tanto, si el lado de la API modifica la respuesta, puede ocurrir una inyección de secuencia de escape. • http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html https://hackerone.com/reports/315081 https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html https://access.redhat.com/security/cve/CVE-2019-8323 https://bugzilla.redhat.com/show_bug.cgi?id=1692519 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::CommandManager#run calls alert_error without escaping, escape sequence injection is possible. (There are many ways to cause an error.) Se descubrió un error en RubyGems 2.6 y posteriormente 3.0.2 Gem :: CommandManager # ejecuta llamadas alert_error sin escapar, la inyección de secuencia de escape es posible. (Hay muchas maneras de causar un error.) • http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html https://hackerone.com/reports/317353 https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html https://access.redhat.com/security/cve/CVE-2019-8325 https://bugzilla.redhat.com/show_bug.cgi?id=1692522 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •