11---
22engine : ruby
33cve : 2019-16255
4- url : https://www.ruby-lang.org/en/news/2019/10/01/code-injection-shell-test-cve-2019-16255/
4+ ghsa : ph7w-p94x-9vvw
5+ url : https://nvd.nist.gov/vuln/detail/CVE-2019-16255
56title : A code injection vulnerability of Shell#[] and Shell#test
67date : 2019-10-01
78description : |
@@ -13,8 +14,31 @@ description: |
1314 Users must never do it. However, we treat this particular case as a
1415 vulnerability because the purpose of Shell#[] and Shell#[] is considered file
1516 testing.
17+ cvss_v2 : 6.8
18+ cvss_v3 : 8.1
1619patched_versions :
1720 - " ~> 2.4.8"
1821 - " ~> 2.5.7"
1922 - " ~> 2.6.5"
2023 - " > 2.7.0-preview1"
24+ related :
25+ url :
26+ - https://nvd.nist.gov/vuln/detail/CVE-2019-16255
27+ - https://www.ruby-lang.org/en/news/2019/10/01/ruby-2-6-5-released
28+ - https://www.ruby-lang.org/en/news/2019/10/01/ruby-2-5-7-released
29+ - https://www.ruby-lang.org/en/news/2019/10/01/ruby-2-4-8-released
30+ - https://www.ruby-lang.org/en/news/2019/10/01/code-injection-shell-test-cve-2019-16255
31+ - https://seclists.org/bugtraq/2019/Dec/31
32+ - https://seclists.org/bugtraq/2019/Dec/32
33+ - https://www.debian.org/security/2019/dsa-4587
34+ - https://lists.debian.org/debian-lts-announce/2019/11/msg00025.html
35+ - http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html
36+ - https://security.gentoo.org/glsa/202003-06
37+ - https://www.oracle.com/security-alerts/cpujan2020.html
38+ - https://hackerone.com/reports/327512
39+ - https://github.com/jruby/jruby/releases/tag/9.3.0.0
40+ - https://github.com/jruby/jruby/issues/5126
41+ - https://lists.debian.org/debian-lts-announce/2019/12/msg00009.html
42+ - https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html
43+ - https://lists.debian.org/debian-lts-announce/2023/04/msg00033.html
44+ - https://github.com/advisories/GHSA-ph7w-p94x-9vvw
0 commit comments