Update Ruby 2.6.5, 2.5.7 and 2.4.8 with vulnerabilities fixed

Corrective releases of the Ruby programming language have been generated 2.6.5, 2.5.7 ΠΈ 2.4.8, which fixed four vulnerabilities. The most dangerous vulnerability (CVE-2019-16255) in the standard library Shell (lib/shell.rb), which Allows perform code substitution. If data received from the user is processed in the first argument of the Shell#[] or Shell#test methods used to check the presence of a file, an attacker can cause an arbitrary Ruby method to be called.

Other problems:

  • CVE-2019-16254 - exposure to the built-in http server WEBrick HTTP response splitting attack (if a program inserts unverified data into the HTTP response header, then the header can be split by inserting a newline character);
  • CVE-2019-15845 substitution of the null character (\0) into those checked through the β€œFile.fnmatch” and β€œFile.fnmatch?” methods. file paths can be used to falsely trigger the check;
  • CVE-2019-16201 β€” denial of service in the Diges authentication module for WEBrick.

Source: opennet.ru

Add a comment