In versions of mruby up to and including 1.4.0, a use-after-free vulnerability exists in src/io.c::File#initilialize_copy(). An attacker that can cause Ruby code to be run can possibly use this to execute arbitrary code.
References
Link | Resource |
---|---|
https://github.com/mruby/mruby/commit/b51b21fc63c9805862322551387d9036f2b63433 | Patch |
https://github.com/mruby/mruby/issues/4001 | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2018-04-18 15:29
Updated : 2024-02-04 19:46
NVD link : CVE-2018-10199
Mitre link : CVE-2018-10199
CVE.ORG link : CVE-2018-10199
JSON object : View
Products Affected
mruby
- mruby
CWE
CWE-416
Use After Free