Ruby before 2.4.3 allows Net::FTP command injection. Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file. If the localfile argument starts with the "|" pipe character, the command following the pipe character is executed. The default value of localfile is File.basename(remotefile), so malicious FTP servers could cause arbitrary command execution.
http://www.securityfocus.com/bid/102204
http://www.securitytracker.com/id/1042004
https://access.redhat.com/errata/RHSA-2018:0378
https://access.redhat.com/errata/RHSA-2018:0583
https://access.redhat.com/errata/RHSA-2018:0584
https://access.redhat.com/errata/RHSA-2018:0585
https://access.redhat.com/errata/RHSA-2019:2806
https://lists.debian.org/debian-lts-announce/2017/12/msg00024.html
https://lists.debian.org/debian-lts-announce/2017/12/msg00025.html
https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html
https://www.debian.org/security/2018/dsa-4259
https://www.exploit-db.com/exploits/43381/
https://www.ruby-lang.org/en/news/2017/12/14/net-ftp-command-injection-cve-2017-17405/
https://www.ruby-lang.org/en/news/2017/12/14/ruby-2-4-3-released/
Source: MITRE
Published: 2017-12-15
Updated: 2019-09-19
Type: CWE-78
Base Score: 9.3
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C
Impact Score: 10
Exploitability Score: 8.6
Severity: HIGH
Base Score: 8.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Impact Score: 5.9
Exploitability Score: 2.8
Severity: HIGH
OR
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:* versions from 2.2 to 2.2.8 (inclusive)
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:* versions from 2.3 to 2.3.5 (inclusive)
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:* versions from 2.4 to 2.4.2 (inclusive)
OR
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
OR
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
ID | Name | Product | Family | Severity |
---|---|---|---|---|
137599 | SUSE SLES12 Security Update : ruby2.1 (SUSE-SU-2020:1570-1) | Nessus | SuSE Local Security Checks | high |
129040 | RHEL 7 : ruby (RHSA-2019:2806) | Nessus | Red Hat Local Security Checks | high |
127164 | NewStart CGSL MAIN 5.04 : ruby Multiple Vulnerabilities (NS-SA-2019-0013) | Nessus | NewStart CGSL Local Security Checks | high |
124910 | EulerOS Virtualization for ARM 64 3.0.1.0 : ruby (EulerOS-SA-2019-1407) | Nessus | Huawei Local Security Checks | high |
700517 | macOS 10.13.x < 10.13.6 Multiple Vulnerabilities | Nessus Network Monitor | Operating System Detection | critical |
121908 | Photon OS 2.0: Ruby PHSA-2018-2.0-0011-(a) | Nessus | PhotonOS Local Security Checks | high |
121799 | Photon OS 1.0: Ruby PHSA-2018-1.0-0098-(a) | Nessus | PhotonOS Local Security Checks | high |
118573 | macOS and Mac OS X Multiple Vulnerabilities (Security Update 2018-005) | Nessus | MacOS X Local Security Checks | critical |
117557 | EulerOS Virtualization 2.5.0 : ruby (EulerOS-SA-2018-1248) | Nessus | Huawei Local Security Checks | high |
111910 | Photon OS 1.0: Glibc / Ruby PHSA-2018-1.0-0098-(a) (deprecated) | Nessus | PhotonOS Local Security Checks | high |
111468 | Debian DSA-4259-1 : ruby2.3 - security update | Nessus | Debian Local Security Checks | high |
111281 | Photon OS 2.0 : ruby / glibc (PhotonOS-PHSA-2018-2.0-0011-(a)) (deprecated) | Nessus | PhotonOS Local Security Checks | high |
111137 | macOS 10.13.x < 10.13.6 Multiple Vulnerabilities | Nessus | MacOS X Local Security Checks | critical |
111136 | macOS and Mac OS X Multiple Vulnerabilities (Security Update 2018-004) | Nessus | MacOS X Local Security Checks | critical |
111081 | Debian DLA-1421-1 : ruby2.1 security update | Nessus | Debian Local Security Checks | high |
108471 | EulerOS 2.0 SP2 : ruby (EulerOS-SA-2018-1067) | Nessus | Huawei Local Security Checks | high |
108470 | EulerOS 2.0 SP1 : ruby (EulerOS-SA-2018-1066) | Nessus | Huawei Local Security Checks | high |
107270 | CentOS 7 : ruby (CESA-2018:0378) | Nessus | CentOS Local Security Checks | high |
107084 | Scientific Linux Security Update : ruby on SL7.x x86_64 (20180228) | Nessus | Scientific Linux Local Security Checks | high |
107082 | RHEL 7 : ruby (RHSA-2018:0378) | Nessus | Red Hat Local Security Checks | high |
107080 | Oracle Linux 7 : ruby (ELSA-2018-0378) | Nessus | Oracle Linux Local Security Checks | high |
106886 | GLSA-201802-05 : Ruby: Command injection | Nessus | Gentoo Local Security Checks | high |
105583 | Ubuntu 14.04 LTS / 16.04 LTS / 17.04 / 17.10 : ruby1.9.1, ruby2.0, ruby2.3 vulnerability (USN-3515-1) | Nessus | Ubuntu Local Security Checks | high |
105429 | Debian DLA-1222-1 : ruby1.8 security update | Nessus | Debian Local Security Checks | high |
105428 | Debian DLA-1221-1 : ruby1.9.1 security update | Nessus | Debian Local Security Checks | high |
105377 | Slackware 14.2 / current : ruby (SSA:2017-353-01) | Nessus | Slackware Local Security Checks | high |
105363 | FreeBSD : ruby -- Command injection vulnerability in Net::FTP (dd644964-e10e-11e7-8097-0800271d4b9c) | Nessus | FreeBSD Local Security Checks | high |