11---
22engine : ruby
33cve : 2019-16255
4- url : https://www.ruby-lang.org/en/news/2019/10/01/code-injection-shell-test-cve-2019-16255/
4+ ghsa : ph7w-p94x-9vvw
5+ url : https://nvd.nist.gov/vuln/detail/CVE-2019-16255
56title : A code injection vulnerability of Shell#[] and Shell#test
67date : 2019-10-01
78description : |
@@ -13,8 +14,33 @@ description: |
1314 Users must never do it. However, we treat this particular case as a
1415 vulnerability because the purpose of Shell#[] and Shell#[] is considered file
1516 testing.
17+
18+ Note: Mentioned as being fixed in JRuby 9.3.0.0 release. URLs at bottom of list.
19+ cvss_v2 : 6.8
20+ cvss_v3 : 8.1
1621patched_versions :
1722 - " ~> 2.4.8"
1823 - " ~> 2.5.7"
1924 - " ~> 2.6.5"
2025 - " > 2.7.0-preview1"
26+ related :
27+ url :
28+ - https://nvd.nist.gov/vuln/detail/CVE-2019-16255
29+ - https://www.ruby-lang.org/en/news/2019/10/01/ruby-2-6-5-released
30+ - https://www.ruby-lang.org/en/news/2019/10/01/ruby-2-5-7-released
31+ - https://www.ruby-lang.org/en/news/2019/10/01/ruby-2-4-8-released
32+ - https://www.ruby-lang.org/en/news/2019/10/01/code-injection-shell-test-cve-2019-16255
33+ - https://seclists.org/bugtraq/2019/Dec/31
34+ - https://seclists.org/bugtraq/2019/Dec/32
35+ - https://www.debian.org/security/2019/dsa-4587
36+ - https://lists.debian.org/debian-lts-announce/2019/11/msg00025.html
37+ - http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html
38+ - https://security.gentoo.org/glsa/202003-06
39+ - https://www.oracle.com/security-alerts/cpujan2020.html
40+ - https://hackerone.com/reports/327512
41+ - https://github.com/jruby/jruby/releases/tag/9.3.0.0
42+ - https://github.com/jruby/jruby/issues/5126
43+ - https://lists.debian.org/debian-lts-announce/2019/12/msg00009.html
44+ - https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html
45+ - https://lists.debian.org/debian-lts-announce/2023/04/msg00033.html
46+ - https://github.com/advisories/GHSA-ph7w-p94x-9vvw
0 commit comments