Skip to content

Commit acdadc2

Browse files
committed
Merge branch 'CVE-2024-27281-rdoc'
2 parents be93daf + 09738ad commit acdadc2

File tree

1 file changed

+46
-0
lines changed

1 file changed

+46
-0
lines changed
Lines changed: 46 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,46 @@
1+
---
2+
layout: news_post
3+
title: "CVE-2024-27281: RCE vulnerability with .rdoc_options in RDoc"
4+
author: "hsbt"
5+
translator:
6+
date: 2023-03-21 11:00:00 +0000
7+
tags: security
8+
lang: en
9+
---
10+
11+
We have released the RDoc gem version 6.3.4, 6.4.1, 6.5.1 and 6.6.3 that have a security fix for a RCE vulnerability.
12+
This vulnerability has been assigned the CVE identifier [CVE-2024-27281](https://www.cve.org/CVERecord?id=CVE-2024-27281).
13+
14+
## Details
15+
16+
An issue was discovered in RDoc 6.3.3 through 6.6.2, as distributed in Ruby 3.x through 3.3.0.
17+
18+
When parsing `.rdoc_options` (used for configuration in RDoc) as a YAML file, object injection and resultant remote code execution are possible because there are no restrictions on the classes that can be restored.
19+
20+
When loading the documentation cache, object injection and resultant remote code execution are also possible if there were a crafted cache.
21+
22+
## Recommended action
23+
24+
We recommend to update the RDoc gem to version 6.6.3 or later. In order to ensure compatibility with bundled version in older Ruby series, you may update as follows instead:
25+
26+
* For Ruby 3.0 users: Update to `rdoc` 6.3.4
27+
* For Ruby 3.1 users: Update to `time` 6.4.1
28+
* For Ruby 3.2 users: Update to `time` 6.5.1
29+
30+
You can use `gem update rdoc` to update it. If you are using bundler, please add `gem "rdoc", ">= 6.6.3"` to your `Gemfile`.
31+
32+
## Affected versions
33+
34+
* Ruby 3.0.6 or lower
35+
* Ruby 3.1.4 or lower
36+
* Ruby 3.2.3 or lower
37+
* Ruby 3.3.0
38+
* RDoc gem 6.3.3 or lower, 6.4.0 through 6.6.2 without the patch versions (6.3.4, 6.4.1, 6.5.1, 6.6.3)
39+
40+
## Credits
41+
42+
Thanks to [ooooooo_q](https://hackerone.com/ooooooo_q?type=user) for discovering this issue.
43+
44+
## History
45+
46+
* Originally published at 2024-03-31 11:00:00 (UTC)

0 commit comments

Comments
 (0)