SB2018032913 - Path traversal in ruby (Alpine package)
Published: March 29, 2018
Security Bulletin ID
SB2018032913
Severity
Low
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Remote access
Highest impact
Data manipulation
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Path traversal (CVE-ID: CVE-2018-6914)
The vulnerability allows a remote attacker to write arbitrary files on the target system.The weakness exists in the Dir.mktmpdir method in the tmpdir library due to path traversal. A remote attacker can create a directory or a file at any directory in the prefix argument.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=9f704bf9da4bdb94ea9e7bcee0259b0b5f8f937d
- https://git.alpinelinux.org/aports/commit/?id=0666c3405e078562e5e6cefc77d45e8cc91092bc
- https://git.alpinelinux.org/aports/commit/?id=0bba17025ab6922c000ede63361dd0220e92ed31
- https://git.alpinelinux.org/aports/commit/?id=1779cab830661bf6686eb27c5b5c3117f8b91cee
- https://git.alpinelinux.org/aports/commit/?id=8e71f2e5fdb9d522368ddca664bf4a3f68864028
- https://git.alpinelinux.org/aports/commit/?id=a491b96c266e9165971fad3460ad3c8371fa5f3d