
CVE-2022-36073 – RubyGems allows creation of users with arbitrary unverified emails
https://notcve.org/view.php?id=CVE-2022-36073
07 Sep 2022 — RubyGems.org is the Ruby community gem host. A bug in password & email change confirmation code allowed an attacker to change their RubyGems.org account's email to an unowned email address. Having access to an account whose email has been changed could enable an attacker to save API keys for that account, and when a legitimate user attempts to create an account with their email (and has to reset password to gain access) and is granted access to other gems, the attacker would then be able to publish and yank... • https://github.com/rubygems/rubygems.org/commit/90c9e6aac2d91518b479c51d48275c57de492d4d • CWE-287: Improper Authentication •

CVE-2019-8322 – rubygems: Escape sequence injection vulnerability in gem owner
https://notcve.org/view.php?id=CVE-2019-8322
17 Apr 2019 — An issue was discovered in RubyGems 2.6 and later through 3.0.2. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur. Se descubrió un error en RubyGems 2.6 y mucho más tarde hasta 3.0.2 El comando de propietario de gemas envía el contenido de la respuesta de la API directamente a la salida estándar. Por lo tanto, si la respuesta es elaborada, puede ocurrir una inyección de secuencia de escape. • http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •

CVE-2019-8325 – rubygems: Escape sequence injection vulnerability in errors
https://notcve.org/view.php?id=CVE-2019-8325
17 Apr 2019 — An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::CommandManager#run calls alert_error without escaping, escape sequence injection is possible. (There are many ways to cause an error.) Se descubrió un error en RubyGems 2.6 y posteriormente 3.0.2 Gem :: CommandManager # ejecuta llamadas alert_error sin escapar, la inyección de secuencia de escape es posible. (Hay muchas maneras de causar un error.) • http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •

CVE-2019-8321 – rubygems: Escape sequence injection vulnerability in verbose
https://notcve.org/view.php?id=CVE-2019-8321
17 Apr 2019 — An issue was discovered in RubyGems 2.6 and later through 3.0.2. Since Gem::UserInteraction#verbose calls say without escaping, escape sequence injection is possible. Se descubrió un error en RubyGems 2.6 y más tarde hasta 3.0.2. hasta Gem::UserInteraction#verbose Dado que las llamadas verbales Gem :: UserInteraction # verbose dicen que sin escape, la inyección de secuencia de escape es posible Red Hat CloudForms Management Engine delivers the insight, control, and automation needed to address the challenge... • http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html • CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •

CVE-2019-8323 – rubygems: Escape sequence injection vulnerability in API response handling
https://notcve.org/view.php?id=CVE-2019-8323
17 Apr 2019 — An issue was discovered in RubyGems 2.6 and later through 3.0.2. Gem::GemcutterUtilities#with_response may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur. Se descubrió un error in RubyGems 2.6 y posteriormente hasta 3.0.2 Gem::GemcutterUtilities#with La respuesta puede generar la respuesta de la API a stdout tal como está. Por lo tanto, si el lado de la API modifica la respuesta, puede ocurrir una inyección de secuencia de es... • http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-88: Improper Neutralization of Argument Delimiters in a Command ('Argument Injection') •

CVE-2019-8324 – rubygems: Installing a malicious gem may lead to arbitrary code execution
https://notcve.org/view.php?id=CVE-2019-8324
12 Apr 2019 — An issue was discovered in RubyGems 2.6 and later through 3.0.2. A crafted gem with a multi-line name is not handled correctly. Therefore, an attacker could inject arbitrary code to the stub line of gemspec, which is eval-ed by code in ensure_loadable_spec during the preinstall check. Se descubrió un error en RubyGems 2.6 y posteriormente hasta 3.0.2 Una gema hecha a mano con un nombre de varias líneas no se maneja correctamente. Por lo tanto, un atacante podría inyectar un código arbitrario a la línea de c... • http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html • CWE-20: Improper Input Validation CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2019-8320 – rubygems: Delete directory using symlink when decompressing tar
https://notcve.org/view.php?id=CVE-2019-8320
12 Apr 2019 — A Directory Traversal issue was discovered in RubyGems 2.7.6 and later through 3.0.2. Before making new directories or touching files (which now include path-checking code for symlinks), it would delete the target destination. If that destination was hidden behind a symlink, a malicious gem could delete arbitrary files on the user's machine, presuming the attacker could guess at paths. Given how frequently gem is run as sudo, and how predictable paths are on modern systems (/tmp, /usr, etc.), this could lik... • http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •