CVE-2022-29218

RubyGems is a package registry used to supply software for the Ruby language ecosystem. An ordering mistake in the code that accepts gem uploads allowed some gems (with platforms ending in numbers, like `arm64-darwin-21`) to be temporarily replaced in the CDN cache by a malicious package. The bug has been patched, and is believed to have never been exploited, based on an extensive review of logs and existing gems by rubygems. The easiest way to ensure that an application has not been exploited by this vulnerability is to verify all downloaded .gems checksums match the checksum recorded in the RubyGems.org database. RubyGems.org has been patched and is no longer vulnerable to this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rubygems:rubygems.org:-:*:*:*:*:*:*:*

History

02 Dec 2022, 23:00

Type Values Removed Values Added
References (CONFIRM) https://security.netapp.com/advisory/ntap-20220629-0010/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20220629-0010/ - Third Party Advisory

29 Jun 2022, 19:15

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20220629-0010/ -
CWE CWE-863 CWE-290
CWE-269

26 May 2022, 13:35

Type Values Removed Values Added
CPE cpe:2.3:a:rubygems:rubygems.org:-:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 7.5
CWE CWE-863
References (CONFIRM) https://github.com/rubygems/rubygems.org/security/advisories/GHSA-2jmx-8mh8-pm8w - (CONFIRM) https://github.com/rubygems/rubygems.org/security/advisories/GHSA-2jmx-8mh8-pm8w - Exploit, Third Party Advisory

13 May 2022, 01:36

Type Values Removed Values Added
New CVE

Information

Published : 2022-05-13 01:15

Updated : 2024-02-04 22:29


NVD link : CVE-2022-29218

Mitre link : CVE-2022-29218

CVE.ORG link : CVE-2022-29218


JSON object : View

Products Affected

rubygems

  • rubygems.org
CWE
CWE-269

Improper Privilege Management

CWE-290

Authentication Bypass by Spoofing

CWE-863

Incorrect Authorization