CVE-2021-31799 log
Source |
|
Severity | Medium |
Remote | Yes |
Type | Arbitrary command execution |
Description | RDoc before version 6.3.1, as bundled with Ruby before version 2.7.4 and 2.6.8 as well as GitLab before version 14.0.2, used to call Kernel#open to open a local file. If a Ruby project has a file whose name starts with "|" and ends with "tags", the command following the pipe character is executed. A malicious Ruby project could exploit it to run an arbitrary command execution against a user who attempts to run the rdoc command. |
Group | Package | Affected | Fixed | Severity | Status | Ticket |
---|---|---|---|---|---|---|
AVG-2140 | ruby2.6 | 2.6.7-1 | 2.6.8-1 | High | Fixed | |
AVG-2125 | gitlab | 14.0.1-1 | 14.0.3-1 | High | Fixed | |
AVG-1906 | jruby | 9.2.19.0-1 | 9.3.0.0-1 | High | Fixed | |
AVG-1905 | gitlab-gitaly | 14.2.1-1 | 14.2.2-1 | Medium | Fixed | |
AVG-1901 | ruby-rdoc | 6.3.0-3 | 6.3.1-1 | Medium | Fixed |
Date | Advisory | Group | Package | Severity | Type |
---|---|---|---|---|---|
14 Jul 2021 | ASA-202107-25 | AVG-2140 | ruby2.6 | High | multiple issues |
06 Jul 2021 | ASA-202107-18 | AVG-2125 | gitlab | High | multiple issues |