CVE-2018-8780
Summary
| CVE | CVE-2018-8780 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2018-04-03 22:29:00 UTC |
| Updated | 2019-07-21 12:15:00 UTC |
| Description | In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the Dir.open, Dir.new, Dir.entries and Dir.empty? methods do not check NULL characters. When using the corresponding method, unintentional directory traversal may be performed. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
Third Party Advisory |
| Ruby 2.5.1 Released |
CONFIRM |
www.ruby-lang.org |
Patch, Vendor Advisory |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
Third Party Advisory |
| [SECURITY] [DLA 1421-1] ruby2.1 security update |
MLIST |
lists.debian.org |
Mailing List, Third Party Advisory |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
|
| CVE-2018-8780: Unintentional directory traversal by poisoned NUL byte in Dir |
CONFIRM |
www.ruby-lang.org |
Vendor Advisory |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
Third Party Advisory |
| [SECURITY] [DLA 1359-1] ruby1.8 security update |
MLIST |
lists.debian.org |
Mailing List, Third Party Advisory |
| Apple macOS/OS X Multiple Remote Code Execution, Denial of Service, and Information Disclosure Attacks and Local Privilege Escalation Attacks - SecurityTracker |
SECTRACK |
www.securitytracker.com |
Third Party Advisory, VDB Entry |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
|
| USN-3626-1: Ruby vulnerabilities | Ubuntu security notices |
UBUNTU |
usn.ubuntu.com |
Third Party Advisory |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
|
| Ruby 2.4.4 Released |
CONFIRM |
www.ruby-lang.org |
Patch, Vendor Advisory |
| Red Hat Customer Portal |
REDHAT |
access.redhat.com |
|
| Ruby 2.2.10 Released |
CONFIRM |
www.ruby-lang.org |
Patch, Vendor Advisory |
| Ruby CVE-2018-8780 Directory Traversal Vulnerability |
BID |
www.securityfocus.com |
Third Party Advisory, VDB Entry |
| [security-announce] openSUSE-SU-2019:1771-1: important: Security update |
SUSE |
lists.opensuse.org |
|
| Debian -- Security Information -- DSA-4259-1 ruby2.3 |
DEBIAN |
www.debian.org |
Third Party Advisory |
| [SECURITY] [DLA 1358-1] ruby1.9.1 security update |
MLIST |
lists.debian.org |
Mailing List, Third Party Advisory |
| Ruby 2.3.7 Released |
CONFIRM |
www.ruby-lang.org |
Patch, Vendor Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 377477 Alibaba Cloud Linux Security Update for ruby (ALINUX2-SA-2019:0111)
- 500610 Alpine Linux Security Update for ruby
- 504370 Alpine Linux Security Update for ruby
- 904868 Common Base Linux Mariner (CBL-Mariner) Security Update for ruby (12424)