CVE-2018-8780
ruby: Unintentional directory traversal by poisoned NULL byte in Dir
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the Dir.open, Dir.new, Dir.entries and Dir.empty? methods do not check NULL characters. When using the corresponding method, unintentional directory traversal may be performed.
En Ruby, en versiones anteriores a la 2.2.10, versiones 2.3.x anteriores a la 2.3.7, versiones 2.4.x anteriores a la 2.4.4, versiones 2.5.x anteriores a la 2.5.1 y la versión 2.6.0-preview1, los métodos Dir.open, Dir.new, Dir.entries y Dir.empty? no comprueban los caracteres NULL. Al emplear el método correspondiente, podría realizarse un salto de directorio no intencionado.
It was found that the methods from the Dir class did not properly handle strings containing the NULL byte. An attacker, able to inject NULL bytes in a path, could possibly trigger an unspecified behavior of the ruby script.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2018-03-19 CVE Reserved
- 2018-03-30 CVE Published
- 2024-07-07 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (22)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/103739 | Third Party Advisory | |
http://www.securitytracker.com/id/1042004 | Third Party Advisory | |
https://lists.debian.org/debian-lts-announce/2018/04/msg00023.html | Mailing List | |
https://lists.debian.org/debian-lts-announce/2018/04/msg00024.html | Mailing List | |
https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html | Mailing List |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00036.html | 2019-07-21 | |
https://access.redhat.com/errata/RHSA-2018:3729 | 2019-07-21 | |
https://access.redhat.com/errata/RHSA-2018:3730 | 2019-07-21 | |
https://access.redhat.com/errata/RHSA-2018:3731 | 2019-07-21 | |
https://access.redhat.com/errata/RHSA-2019:2028 | 2019-07-21 | |
https://access.redhat.com/errata/RHSA-2020:0542 | 2019-07-21 | |
https://access.redhat.com/errata/RHSA-2020:0591 | 2019-07-21 | |
https://access.redhat.com/errata/RHSA-2020:0663 | 2019-07-21 | |
https://usn.ubuntu.com/3626-1 | 2019-07-21 | |
https://www.debian.org/security/2018/dsa-4259 | 2019-07-21 | |
https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780 | 2019-07-21 | |
https://access.redhat.com/security/cve/CVE-2018-8780 | 2020-03-03 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1561949 | 2020-03-03 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | < 2.2.10 Search vendor "Ruby-lang" for product "Ruby" and version " < 2.2.10" | - |
Affected
| ||||||
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | >= 2.3.0 < 2.3.7 Search vendor "Ruby-lang" for product "Ruby" and version " >= 2.3.0 < 2.3.7" | - |
Affected
| ||||||
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | >= 2.4.0 < 2.4.4 Search vendor "Ruby-lang" for product "Ruby" and version " >= 2.4.0 < 2.4.4" | - |
Affected
| ||||||
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | >= 2.5.0 < 2.5.1 Search vendor "Ruby-lang" for product "Ruby" and version " >= 2.5.0 < 2.5.1" | - |
Affected
| ||||||
Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | 2.6.0 Search vendor "Ruby-lang" for product "Ruby" and version "2.6.0" | preview1 |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 14.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "14.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 16.04 Search vendor "Canonical" for product "Ubuntu Linux" and version "16.04" | lts |
Affected
| ||||||
Canonical Search vendor "Canonical" | Ubuntu Linux Search vendor "Canonical" for product "Ubuntu Linux" | 17.10 Search vendor "Canonical" for product "Ubuntu Linux" and version "17.10" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 7.0 Search vendor "Debian" for product "Debian Linux" and version "7.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
|