Ruby-Lang Ruby vulnerabilities

94 known vulnerabilities affecting ruby-lang/ruby.

Total CVEs
94
CISA KEV
0
Public exploits
9
Exploited in wild
0
Severity breakdown
CRITICAL16HIGH34MEDIUM44

Vulnerabilities

Page 1 of 5
CVE-2023-28756MEDIUMCVSS 5.3≤ 2.7.72023-03-31
CVE-2023-28756 [MEDIUM] CWE-1333 CVE-2023-28756: A ReDoS issue was discovered in the Time component through 0.2.1 in Ruby through 3.2.1. The Time par A ReDoS issue was discovered in the Time component through 0.2.1 in Ruby through 3.2.1. The Time parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to Time objects. The fixed versions are 0.1.1 and 0.2.2.
nvd
CVE-2021-33621HIGHCVSS 8.8≥ 2.7.0, < 2.7.7≥ 3.0.0, < 3.0.5+1 more2022-11-18
CVE-2021-33621 [HIGH] CWE-74 CVE-2021-33621: The cgi gem before 0.1.0.2, 0.2.x before 0.2.2, and 0.3.x before 0.3.5 for Ruby allows HTTP response The cgi gem before 0.1.0.2, 0.2.x before 0.2.2, and 0.3.x before 0.3.5 for Ruby allows HTTP response splitting. This is relevant to applications that use untrusted user input either to generate an HTTP response or to create a CGI::Cookie object.
nvd
CVE-2016-2338CRITICALCVSS 9.8v2.2.2v2.3.02022-09-29
CVE-2016-2338 [CRITICAL] CWE-787 CVE-2016-2338: An exploitable heap overflow vulnerability exists in the Psych::Emitter start_document function of R An exploitable heap overflow vulnerability exists in the Psych::Emitter start_document function of Ruby. In Psych::Emitter start_document function heap buffer "head" allocation is made based on tags array length. Specially constructed object passed as element of tags array can increase this array size after mentioned allocation and cause heap overfl
nvd
CVE-2022-28738CRITICALCVSS 9.8≥ 3.0.0, < 3.0.4≥ 3.1.0, < 3.1.22022-05-09
CVE-2022-28738 [CRITICAL] CWE-415 CVE-2022-28738: A double free was found in the Regexp compiler in Ruby 3.x before 3.0.4 and 3.1.x before 3.1.2. If a A double free was found in the Regexp compiler in Ruby 3.x before 3.0.4 and 3.1.x before 3.1.2. If a victim attempts to create a Regexp from untrusted user input, an attacker may be able to write to unexpected memory locations.
nvdosv
CVE-2022-28739HIGHCVSS 7.5fixed in 2.6.10≥ 2.7.0, < 2.7.6+2 more2022-05-09
CVE-2022-28739 [HIGH] CWE-125 CVE-2022-28739: There is a buffer over-read in Ruby before 2.6.10, 2.7.x before 2.7.6, 3.x before 3.0.4, and 3.1.x b There is a buffer over-read in Ruby before 2.6.10, 2.7.x before 2.7.6, 3.x before 3.0.4, and 3.1.x before 3.1.2. It occurs in String-to-Float conversion, including Kernel#Float and String#to_f.
nvd
CVE-2021-41819HIGHCVSS 7.5≤ 2.6.8≥ 2.7.0, < 2.7.5+1 more2022-01-01
CVE-2021-41819 [HIGH] CWE-565 CVE-2021-41819: CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affe CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem through 0.3.0 for Ruby.
nvd
CVE-2021-41817HIGHCVSS 7.5≥ 2.6.0, < 2.6.9≥ 2.7.0, < 2.7.5+1 more2022-01-01
CVE-2021-41817 [HIGH] CWE-1333 CVE-2021-41817: Date.parse in the date gem through 3.2.0 for Ruby allows ReDoS (regular expression Denial of Service Date.parse in the date gem through 3.2.0 for Ruby allows ReDoS (regular expression Denial of Service) via a long string. The fixed versions are 3.2.1, 3.1.2, 3.0.2, and 2.0.1.
nvd
CVE-2021-32066HIGHCVSS 7.4≥ 2.6.0, ≤ 2.6.7≥ 2.7.0, ≤ 2.7.3+1 more2021-08-01
CVE-2021-32066 [HIGH] CWE-755 CVE-2021-32066: An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. Net::IMAP An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. Net::IMAP does not raise an exception when StartTLS fails with an an unknown response, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command,
nvd
CVE-2021-28966HIGHCVSS 7.5fixed in 2.7.3≥ 3.0.0, < 3.0.12021-07-30
CVE-2021-28966 [HIGH] CWE-22 CVE-2021-28966: In Ruby through 3.0 on Windows, a remote attacker can submit a crafted path when a Web application h In Ruby through 3.0 on Windows, a remote attacker can submit a crafted path when a Web application handles a parameter with TmpDir.
nvdosv
CVE-2021-31810MEDIUMCVSS 5.8≤ 2.6.7≥ 2.7.0, ≤ 2.7.3+1 more2021-07-13
CVE-2021-31810 [MEDIUM] CVE-2021-31810: An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. A malicio An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. A malicious FTP server can use the PASV response to trick Net::FTP into connecting back to a given IP address and port. This potentially makes curl extract information about services that are otherwise private and not disclosed (e.g., the attacker can conduct port sca
nvd
CVE-2021-28965HIGHCVSS 7.5fixed in 2.6.7≥ 2.7.0, < 2.7.3+1 more2021-04-21
CVE-2021-28965 [HIGH] CVE-2021-28965: The REXML gem before 3.2.5 in Ruby before 2.6.7, 2.7.x before 2.7.3, and 3.x before 3.0.1 does not p The REXML gem before 3.2.5 in Ruby before 2.6.7, 2.7.x before 2.7.3, and 3.x before 3.0.1 does not properly address XML round-trip issues. An incorrect document can be produced after parsing and serializing.
nvd
CVE-2020-16255MEDIUMCVSS 6.1≥ 0, < 2.5.8-r02021-01-15
CVE-2020-16255 [MEDIUM] CVE-2020-16255: ownCloud (Core) before 10 ownCloud (Core) before 10.5 allows XSS in login page 'forgot password.'
osv
CVE-2020-25613HIGHCVSS 7.5≤ 2.5.8≥ 2.6.0, ≤ 2.6.6+1 more2020-10-06
CVE-2020-25613 [HIGH] CWE-444 CVE-2020-25613: An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smu
nvd
CVE-2020-10933MEDIUMCVSS 5.3≥ 2.5.0, ≤ 2.5.7≥ 2.6.0, ≤ 2.6.5+1 more2020-05-04
CVE-2020-10933 [MEDIUM] CWE-908 CVE-2020-10933: An issue was discovered in Ruby 2.5.x through 2.5.7, 2.6.x through 2.6.5, and 2.7.0. If a victim cal An issue was discovered in Ruby 2.5.x through 2.5.7, 2.6.x through 2.6.5, and 2.7.0. If a victim calls BasicSocket#read_nonblock(requested_size, buffer, exception: false), the method resizes the buffer to fit the requested size, but no data is copied. Thus, the buffer string provides the previous value of the heap. This may expose possibly sensitive
nvd
CVE-2020-5247HIGHCVSS 7.5≤ 2.3.0≥ 2.4.0, ≤ 2.4.7+3 more2020-02-28
CVE-2020-5247 [HIGH] CWE-113 CVE-2020-5247: In Puma (RubyGem) before 4.3.2 and before 3.12.3, if an application using Puma allows untrusted inpu In Puma (RubyGem) before 4.3.2 and before 3.12.3, if an application using Puma allows untrusted input in a response header, an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content, such as additional headers or an entirely new response body. This vulnerability is known as HTTP Response Splitti
nvd
CVE-2015-1855MEDIUMCVSS 5.9≥ 2.1.0, < 2.1.6≥ 2.2.0, < 2.2.2+1 more2019-11-29
CVE-2015-1855 [MEDIUM] CWE-20 CVE-2015-1855: verify_certificate_identity in the OpenSSL extension in Ruby before 2.0.0 patchlevel 645, 2.1.x befo verify_certificate_identity in the OpenSSL extension in Ruby before 2.0.0 patchlevel 645, 2.1.x before 2.1.6, and 2.2.x before 2.2.2 does not properly validate hostnames, which allows remote attackers to spoof servers via vectors related to (1) multiple wildcards, (1) wildcards in IDNA names, (3) case sensitivity, and (4) non-ASCII characters.
nvd
CVE-2011-4121CRITICALCVSS 9.8≥ 1.8.7.334, < 1.9.32019-11-26
CVE-2011-4121 [CRITICAL] CWE-326 CVE-2011-4121: The OpenSSL extension of Ruby (Git trunk) versions after 2011-09-01 up to 2011-11-03 always generate The OpenSSL extension of Ruby (Git trunk) versions after 2011-09-01 up to 2011-11-03 always generated an exponent value of '1' to be used for private RSA key generation. A remote attacker could use this flaw to bypass or corrupt integrity of services, depending on strong private RSA keys generation mechanism.
nvd
CVE-2019-16255HIGHCVSS 8.1≥ 2.4.0, ≤ 2.4.7≥ 2.5.0, ≤ 2.5.6+1 more2019-11-26
CVE-2019-16255 [HIGH] CWE-94 CVE-2019-16255: Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows code injection if the first Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows code injection if the first argument (aka the "command" argument) to Shell#[] or Shell#test in lib/shell.rb is untrusted data. An attacker can exploit this to call an arbitrary Ruby method.
nvd
CVE-2019-16201HIGHCVSS 7.5≥ 2.4.0, ≤ 2.4.7≥ 2.5.0, ≤ 2.5.6+1 more2019-11-26
CVE-2019-16201 [HIGH] CWE-287 CVE-2019-16201: WEBrick::HTTPAuth::DigestAuth in Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 ha WEBrick::HTTPAuth::DigestAuth in Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 has a regular expression Denial of Service cause by looping/backtracking. A victim must expose a WEBrick server that uses DigestAuth to the Internet or a untrusted network.
nvd
CVE-2019-15845MEDIUMCVSS 6.5≥ 2.4.0, ≤ 2.4.7≥ 2.5.0, ≤ 2.5.6+1 more2019-11-26
CVE-2019-15845 [MEDIUM] CVE-2019-15845: Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 mishandles path checking within Fil Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 mishandles path checking within File.fnmatch functions.
nvdosv