SB2019050654 - Path traversal in ruby (Alpine package)
Published: May 6, 2019
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Path traversal (CVE-ID: CVE-2019-8320)
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences in gems. A remote attacker can trick the victim to load a specially crafted gem and delete arbitrary files on the system.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=1ea961c4c2a72cdf6383b2bba3c33f4e9faa26da
- https://git.alpinelinux.org/aports/commit/?id=26cc34eb049b628c4c35af1f61ebd8437596d8ca
- https://git.alpinelinux.org/aports/commit/?id=bdcdc921e8387c8a9592aa14cf1d23f133503163
- https://git.alpinelinux.org/aports/commit/?id=58244868e7a471ddf96e8d0ece88c240e34bff1c
- https://git.alpinelinux.org/aports/commit/?id=ac00a3ec880f7f8f92ff425d4e08f233bd5654c9