Vulnerability Description
The ruby_parser-legacy (aka legacy) gem 1.0.0 for Ruby allows local privilege escalation because of world-writable files. For example, if the brakeman gem (which has a legacy dependency) 4.5.0 through 4.7.0 is used, a local user can insert malicious code into the ruby_parser-legacy-1.0.0/lib/ruby_parser/legacy/ruby_parser.rb file.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zenspider | Ruby Parser-Legacy | 1.0.0 |
Related Weaknesses (CWE)
References
- https://github.com/zenspider/ruby_parser-legacy/issues/1ExploitIssue TrackingThird Party Advisory
- https://github.com/zenspider/ruby_parser-legacy/issues/1ExploitIssue TrackingThird Party Advisory
FAQ
What is CVE-2019-18409?
CVE-2019-18409 is a vulnerability with a CVSS score of 7.8 (HIGH). The ruby_parser-legacy (aka legacy) gem 1.0.0 for Ruby allows local privilege escalation because of world-writable files. For example, if the brakeman gem (which has a legacy dependency) 4.5.0 through...
How severe is CVE-2019-18409?
CVE-2019-18409 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-18409?
Check the references section above for vendor advisories and patch information. Affected products include: Zenspider Ruby Parser-Legacy.