Vulnerability Description
RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rubygems | Rubygems | 2.0.0 |
| Debian | Debian Linux | 8.0 |
| Canonical | Ubuntu Linux | 14.04 |
| Redhat | Enterprise Linux Desktop | 7.0 |
| Redhat | Enterprise Linux Server | 7.0 |
| Redhat | Enterprise Linux Server Aus | 7.4 |
| Redhat | Enterprise Linux Server Eus | 7.4 |
| Redhat | Enterprise Linux Server Tus | 7.4 |
| Redhat | Enterprise Linux Workstation | 7.0 |
Related Weaknesses (CWE)
References
- http://blog.rubygems.org/2017/10/09/2.6.14-released.htmlVendor Advisory
- http://blog.rubygems.org/2017/10/09/unsafe-object-deserialization-vulnerability.Vendor Advisory
- http://www.securityfocus.com/bid/101275Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2017:3485Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:0378Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:0583Third Party Advisory
- https://access.redhat.com/errata/RHSA-2018:0585Third Party Advisory
- https://github.com/rubygems/rubygems/commit/510b1638ac9bba3ceb7a5d73135dafff9e5bPatchThird Party Advisory
- https://hackerone.com/reports/274990Third Party Advisory
- https://lists.debian.org/debian-lts-announce/2018/07/msg00012.htmlMailing ListThird Party Advisory
- https://usn.ubuntu.com/3553-1/Third Party Advisory
- https://usn.ubuntu.com/3685-1/Third Party Advisory
- https://www.debian.org/security/2017/dsa-4031Third Party Advisory
- http://blog.rubygems.org/2017/10/09/2.6.14-released.htmlVendor Advisory
- http://blog.rubygems.org/2017/10/09/unsafe-object-deserialization-vulnerability.Vendor Advisory
FAQ
What is CVE-2017-0903?
CVE-2017-0903 is a vulnerability with a CVSS score of 9.8 (CRITICAL). RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted ...
How severe is CVE-2017-0903?
CVE-2017-0903 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-0903?
Check the references section above for vendor advisories and patch information. Affected products include: Rubygems Rubygems, Debian Debian Linux, Canonical Ubuntu Linux, Redhat Enterprise Linux Desktop, Redhat Enterprise Linux Server.