The open-uri-cached rubygem allows local users to execute arbitrary Ruby code by creating a directory under /tmp containing "openuri-" followed by a crafted UID, and putting Ruby code in said directory once a meta file is created.
References
Configurations
History
21 Nov 2024, 02:29
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.benjaminfleischer.com/2013/03/20/yaml-and-security-in-ruby/ - Third Party Advisory | |
References | () http://www.openwall.com/lists/oss-security/2015/05/06/2 - Mailing List, Third Party Advisory | |
References | () http://www.securityfocus.com/bid/74469 - Third Party Advisory, VDB Entry | |
References | () https://github.com/tigris/open-uri-cached/blob/master/lib/open-uri/cached.rb#L115 - Third Party Advisory | |
References | () https://github.com/tigris/open-uri-cached/blob/master/lib/open-uri/cached.rb#L25 - Third Party Advisory | |
References | () https://github.com/tigris/open-uri-cached/blob/master/lib/open-uri/cached.rb#L39 - Third Party Advisory |
Information
Published : 2017-08-18 16:29
Updated : 2025-04-20 01:37
NVD link : CVE-2015-3649
Mitre link : CVE-2015-3649
CVE.ORG link : CVE-2015-3649
JSON object : View
Products Affected
open-uri-cached_project
- open-uri-cached
CWE
CWE-20
Improper Input Validation