CVE-2021-31799
rubygem-rdoc: Command injection vulnerability in RDoc
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby through 3.0.1, it is possible to execute arbitrary code via | and tags in a filename.
En RDoc versiones 3.11 hasta 6.x versiones anteriores a 6.3.1, como se distribuye con Ruby versiones hasta 3.0.1, es posible ejecutar código arbitrario por medio de | y etiquetas en un nombre de archivo
An operating system command injection flaw was found in RDoc. Using the rdoc command to generate documentation for a malicious Ruby source code could lead to execution of arbitrary commands with the privileges of the user running rdoc.
It was discovered that Ruby incorrectly handled certain inputs. An attacker could possibly use this issue to execute arbitrary code. It was discovered that Ruby incorrectly handled certain inputs. An attacker could possibly use this issue to conduct port scans and service banner extractions. This issue only affected Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 20.10, and Ubuntu 21.04. Various other issues were also addressed.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2021-04-25 CVE Reserved
- 2021-07-21 CVE Published
- 2024-10-15 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
- CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CAPEC
References (8)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2021/10/msg00009.html | Mailing List |
|
https://security-tracker.debian.org/tracker/CVE-2021-31799 | Third Party Advisory | |
https://security.netapp.com/advisory/ntap-20210902-0004 | Third Party Advisory |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.oracle.com/security-alerts/cpuapr2022.html | 2024-01-05 | |
https://www.ruby-lang.org/en/news/2021/05/02/os-command-injection-in-rdoc | 2024-01-05 |
URL | Date | SRC |
---|---|---|
https://security.gentoo.org/glsa/202401-05 | 2024-01-05 | |
https://access.redhat.com/security/cve/CVE-2021-31799 | 2022-02-28 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1980132 | 2022-02-28 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Ruby-lang Search vendor "Ruby-lang" | Rdoc Search vendor "Ruby-lang" for product "Rdoc" | >= 3.11 < 6.3.1 Search vendor "Ruby-lang" for product "Rdoc" and version " >= 3.11 < 6.3.1" | ruby |
Affected
| in | Ruby-lang Search vendor "Ruby-lang" | Ruby Search vendor "Ruby-lang" for product "Ruby" | <= 3.0.1 Search vendor "Ruby-lang" for product "Ruby" and version " <= 3.0.1" | - |
Safe
|
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 9.0 Search vendor "Debian" for product "Debian Linux" and version "9.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 10.0 Search vendor "Debian" for product "Debian Linux" and version "10.0" | - |
Affected
| ||||||
Oracle Search vendor "Oracle" | Jd Edwards Enterpriseone Tools Search vendor "Oracle" for product "Jd Edwards Enterpriseone Tools" | < 9.2.6.1 Search vendor "Oracle" for product "Jd Edwards Enterpriseone Tools" and version " < 9.2.6.1" | - |
Affected
|