CVE-2019-8322
Summary
| CVE | CVE-2019-8322 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-06-17 20:15:00 UTC |
| Updated | 2020-08-19 19:00:00 UTC |
| Description | An issue was discovered in RubyGems 2.6 and later through 3.0.2. The gem owner command outputs the contents of the API response directly to stdout. Therefore, if the response is crafted, escape sequence injection may occur. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| [SECURITY] [DLA 2330-1] jruby security update |
MLIST |
lists.debian.org |
Mailing List, Third Party Advisory |
| HackerOne |
MISC |
hackerone.com |
Permissions Required, Third Party Advisory |
| [security-announce] openSUSE-SU-2019:1771-1: important: Security update |
SUSE |
lists.opensuse.org |
Mailing List, Third Party Advisory |
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 377186 Alibaba Cloud Linux Security Update for ruby (ALINUX2-SA-2019:0034)