CVE-2020-36327Download of Code Without Integrity Check in Bundler

Severity
8.8HIGHNVD
EPSS
24.7%
top 3.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 29
Latest updateMay 24

Description

Bundler 1.16.0 through 2.2.9 and 2.2.11 through 2.2.16 sometimes chooses a dependency source based on the highest gem version number, which means that a rogue gem found at a public source may be chosen, even if the intended choice was a private gem that is a dependency of another private gem that is explicitly depended on by the application. NOTE: it is not correct to use CVE-2021-24105 for every "Dependency Confusion" issue in every product.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages4 packages

NVDbundler/bundler1.16.02.2.10+1
RubyGemsbundler/bundler1.16.02.2.10+1
debiandebian/rubygems< rubygems 3.3.5-1 (bookworm)
Debianrubygems/rubygems< 3.3.5-1+2

Also affects: Fedora 34

Patches

🔴Vulnerability Details

3
OSV
Dependency Confusion in Bundler2021-05-24
GHSA
Dependency Confusion in Bundler2021-05-24
OSV
CVE-2020-36327: Bundler 12021-04-29

📋Vendor Advisories

2
Red Hat
rubygem-bundler: Dependencies of gems with explicit source may be installed from a different source2021-02-09
Debian
CVE-2020-36327: rubygems - Bundler 1.16.0 through 2.2.9 and 2.2.11 through 2.2.16 sometimes chooses a depen...2020
CVE-2020-36327 — Bundler vulnerability | cvebase