CVE-2017-0903

critical
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution.

References

http://blog.rubygems.org/2017/10/09/2.6.14-released.html

http://blog.rubygems.org/2017/10/09/unsafe-object-deserialization-vulnerability.html

http://www.securityfocus.com/bid/101275

https://access.redhat.com/errata/RHSA-2017:3485

https://access.redhat.com/errata/RHSA-2018:0378

https://access.redhat.com/errata/RHSA-2018:0583

https://access.redhat.com/errata/RHSA-2018:0585

https://github.com/rubygems/rubygems/commit/510b1638ac9bba3ceb7a5d73135dafff9e5bab49

https://hackerone.com/reports/274990

https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html

https://usn.ubuntu.com/3553-1/

https://usn.ubuntu.com/3685-1/

https://www.debian.org/security/2017/dsa-4031

Details

Source: MITRE

Published: 2017-10-11

Updated: 2019-10-09

Type: CWE-502

Risk Information

CVSS v2

Base Score: 7.5

Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 10

Severity: HIGH

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Impact Score: 5.9

Exploitability Score: 3.9

Severity: CRITICAL

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:rubygems:rubygems:2.0.0:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.0.0:preview2:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.0.0:preview2.1:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.0.0:preview2.2:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.0.0:rc1:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.0.0:rc2:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.0.1:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.0.2:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.0.3:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.0.4:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.0.5:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.0.6:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.0.7:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.0.8:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.0.9:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.0.10:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.0.11:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.0.12:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.0.13:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.0.14:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.0.15:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.0.16:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.0.17:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.1.0:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.1.0.rc.1:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.1.0.rc.2:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.1.1:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.1.2:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.1.3:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.1.4:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.1.5:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.1.6:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.1.7:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.1.8:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.1.9:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.1.10:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.1.11:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.2.0:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.2.0.preiew.1:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.2.0.rc.1:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.2.1:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.2.2:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.2.3:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.2.4:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.2.5:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.3.0:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.4.0:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.4.1:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.4.2:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.4.3:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.4.4:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.4.5:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.4.6:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.4.7:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.4.8:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.5.0:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.5.1:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.5.2:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.6.0:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.6.1:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.6.2:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.6.3:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.6.4:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.6.5:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.6.6:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.6.7:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.6.8:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.6.9:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.6.10:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.6.11:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.6.12:*:*:*:*:*:*:*

cpe:2.3:a:rubygems:rubygems:2.6.13:*:*:*:*:*:*:*

Configuration 2

OR

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*

cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*

Configuration 4

OR

cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*

cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

Tenable Plugins

View all (19 total)

IDNameProductFamilySeverity
137599SUSE SLES12 Security Update : ruby2.1 (SUSE-SU-2020:1570-1)NessusSuSE Local Security Checks
high
127164NewStart CGSL MAIN 5.04 : ruby Multiple Vulnerabilities (NS-SA-2019-0013)NessusNewStart CGSL Local Security Checks
high
124910EulerOS Virtualization for ARM 64 3.0.1.0 : ruby (EulerOS-SA-2019-1407)NessusHuawei Local Security Checks
high
117557EulerOS Virtualization 2.5.0 : ruby (EulerOS-SA-2018-1248)NessusHuawei Local Security Checks
high
111081Debian DLA-1421-1 : ruby2.1 security updateNessusDebian Local Security Checks
critical
110551Ubuntu 14.04 LTS / 16.04 LTS / 17.10 : Ruby vulnerabilities (USN-3685-1)NessusUbuntu Local Security Checks
critical
108603Amazon Linux AMI : ruby24 / ruby22,ruby23 (ALAS-2018-978)NessusAmazon Linux Local Security Checks
critical
108471EulerOS 2.0 SP2 : ruby (EulerOS-SA-2018-1067)NessusHuawei Local Security Checks
high
108470EulerOS 2.0 SP1 : ruby (EulerOS-SA-2018-1066)NessusHuawei Local Security Checks
high
107270CentOS 7 : ruby (CESA-2018:0378)NessusCentOS Local Security Checks
critical
107084Scientific Linux Security Update : ruby on SL7.x x86_64 (20180228)NessusScientific Linux Local Security Checks
critical
107082RHEL 7 : ruby (RHSA-2018:0378)NessusRed Hat Local Security Checks
critical
107080Oracle Linux 7 : ruby (ELSA-2018-0378)NessusOracle Linux Local Security Checks
critical
106557Ubuntu 16.04 LTS / 17.10 : ruby2.3 vulnerabilities (USN-3553-1)NessusUbuntu Local Security Checks
critical
106278Fedora 27 : ruby (2018-75e780a7c2)NessusFedora Local Security Checks
critical
104503Debian DSA-4031-1 : ruby2.3 - security updateNessusDebian Local Security Checks
critical
104181Amazon Linux AMI : ruby24 (ALAS-2017-915)NessusAmazon Linux Local Security Checks
critical
103760FreeBSD : rubygems -- deserialization vulnerability (2c8bd00d-ada2-11e7-82af-8dbff7d75206)NessusFreeBSD Local Security Checks
critical
103603Amazon Linux AMI : ruby22 / ruby23 (ALAS-2017-906)NessusAmazon Linux Local Security Checks
critical