CVE-2019-16255

Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows code injection if the first argument (aka the "command" argument) to Shell#[] or Shell#test in lib/shell.rb is untrusted data. An attacker can exploit this to call an arbitrary Ruby method.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:a:oracle:graalvm:19.3.0.2:*:*:*:enterprise:*:*:*

History

30 Apr 2023, 23:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2023/04/msg00033.html -

03 Mar 2023, 14:32

Type Values Removed Values Added
References (BUGTRAQ) https://seclists.org/bugtraq/2019/Dec/32 - Mailing List, Third Party Advisory (BUGTRAQ) https://seclists.org/bugtraq/2019/Dec/32 - Broken Link, Mailing List, Third Party Advisory
References (MISC) https://hackerone.com/reports/327512 - Patch, Third Party Advisory (MISC) https://hackerone.com/reports/327512 - Exploit, Patch, Third Party Advisory
References (CONFIRM) https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-5-7-released/ - Vendor Advisory (CONFIRM) https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-5-7-released/ - Release Notes
References (MLIST) https://lists.debian.org/debian-lts-announce/2019/12/msg00009.html - Third Party Advisory (MLIST) https://lists.debian.org/debian-lts-announce/2019/12/msg00009.html - Mailing List, Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html - (MLIST) https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html - Mailing List, Third Party Advisory
References (MISC) https://www.oracle.com/security-alerts/cpujan2020.html - Third Party Advisory (MISC) https://www.oracle.com/security-alerts/cpujan2020.html - Patch, Third Party Advisory
References (BUGTRAQ) https://seclists.org/bugtraq/2019/Dec/31 - Mailing List, Third Party Advisory (BUGTRAQ) https://seclists.org/bugtraq/2019/Dec/31 - Broken Link, Mailing List, Third Party Advisory
References (CONFIRM) https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-6-5-released/ - Vendor Advisory (CONFIRM) https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-6-5-released/ - Release Notes
References (CONFIRM) https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-4-8-released/ - Vendor Advisory (CONFIRM) https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-4-8-released/ - Release Notes
First Time Oracle graalvm
Oracle
CPE cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:graalvm:19.3.0.2:*:*:*:enterprise:*:*:*

Information

Published : 2019-11-26 18:15

Updated : 2023-12-10 13:13


NVD link : CVE-2019-16255

Mitre link : CVE-2019-16255

CVE.ORG link : CVE-2019-16255


JSON object : View

Products Affected

oracle

  • graalvm

ruby-lang

  • ruby

opensuse

  • leap

debian

  • debian_linux
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')