
CVE-2019-16254 – ruby: HTTP response splitting in WEBrick
https://notcve.org/view.php?id=CVE-2019-16254
26 Nov 2019 — Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF. Ruby versiones hasta 2.4.7, versiones 2.5.x hasta 2.5... • http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-113: Improper Neutralization of CRLF Sequences in HTTP Headers ('HTTP Request/Response Splitting') •

CVE-2019-16255 – ruby: Code injection via command argument of Shell#test / Shell#[]
https://notcve.org/view.php?id=CVE-2019-16255
26 Nov 2019 — Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows code injection if the first argument (aka the "command" argument) to Shell#[] or Shell#test in lib/shell.rb is untrusted data. An attacker can exploit this to call an arbitrary Ruby method. Ruby versiones hasta 2.4.7, versiones 2.5.x hasta 2.5.6 y versiones 2.6.x hasta 2.6.4, permite una inyección de código si el primer argumento (también conocido como el argumento "command") para Shell#[] o Shell#test en la biblioteca lib/shell.rb es u... • http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2011-5331
https://notcve.org/view.php?id=CVE-2011-5331
18 Nov 2019 — Distributed Ruby (aka DRuby) 1.8 mishandles instance_eval. Distributed Ruby (también se conoce como DRuby) versión 1.8, maneja inapropiadamente a instance_eval. • https://github.com/tomquinn8/CVE-2011-5331 •

CVE-2011-5330
https://notcve.org/view.php?id=CVE-2011-5330
18 Nov 2019 — Distributed Ruby (aka DRuby) 1.8 mishandles the sending of syscalls. Distributed Ruby (también se conoce como DRuby) versión 1.8, maneja inapropiadamente el envío de syscalls. • https://www.exploit-db.com/exploits/17031 •

CVE-2010-2446
https://notcve.org/view.php?id=CVE-2010-2446
06 Nov 2019 — Rbot Reaction plugin allows command execution El plugin Rbot Reaction, permite una ejecución de comandos • https://security-tracker.debian.org/tracker/CVE-2010-2446 • CWE-20: Improper Input Validation •

CVE-2013-1945
https://notcve.org/view.php?id=CVE-2013-1945
31 Oct 2019 — ruby193 uses an insecure LD_LIBRARY_PATH setting. ruby193 usa una configuración de LD_LIBRARY_PATH no segura. • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2013-1945 • CWE-829: Inclusion of Functionality from Untrusted Control Sphere •

CVE-2019-11879
https://notcve.org/view.php?id=CVE-2019-11879
10 May 2019 — The WEBrick gem 1.4.2 for Ruby allows directory traversal if the attacker once had local access to create a symlink to a location outside of the web root directory. NOTE: The vendor states that this is analogous to Options FollowSymlinks in the Apache HTTP Server, and therefore it is "not a problem. ** EN DISPUTA ** La WEBrick gem versión 1.4.2 para Ruby permite salto de directorio si el atacante alguna vez tuvo acceso local para crear un enlace simbólico a una ubicación fuera del directorio web root. NOTA:... • https://bugs.ruby-lang.org/issues/15835 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2018-16395 – ruby: OpenSSL::X509:: Name equality check does not work correctly
https://notcve.org/view.php?id=CVE-2018-16395
03 Nov 2018 — An issue was discovered in the OpenSSL library in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. When two OpenSSL::X509::Name objects are compared using ==, depending on the ordering, non-equal objects may return true. When the first argument is one character longer than the second, or the second argument contains a character that is one less than a character in the same position of the first argument, the result of == will be true. This could be leveraged to cre... • http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html • CWE-295: Improper Certificate Validation •

CVE-2018-16396 – ruby: Tainted flags are not propagated in Array#pack and String#unpack with some directives
https://notcve.org/view.php?id=CVE-2018-16396
03 Nov 2018 — An issue was discovered in Ruby before 2.3.8, 2.4.x before 2.4.5, 2.5.x before 2.5.2, and 2.6.x before 2.6.0-preview3. It does not taint strings that result from unpacking tainted strings with some formats. Se ha descubierto un problema en Ruby, en versiones anteriores a la 2.3.8, versiones 2.4.x anteriores a la 2.4.5, versiones 2.5.x anteriores a la 2.5.2 y versiones 2.6.x anteriores a la 2.6.0-preview3. No contamina las cadenas que resultan de desempaquetar cadenas contaminadas con algunos formatos. It wa... • http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html • CWE-20: Improper Input Validation •

CVE-2018-3769
https://notcve.org/view.php?id=CVE-2018-3769
05 Jul 2018 — ruby-grape ruby gem suffers from a cross-site scripting (XSS) vulnerability via "format" parameter. La gema de ruby ruby-grape sufre de una vulnerabilidad de Cross-Site Scripting (XSS) mediante el parámetro "format". • https://github.com/ruby-grape/grape/commit/6876b71efc7b03f7ce1be3f075eaa4e7e6de19af • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •