#VU23006 Input validation error in Ruby - CVE-2019-15845
Published: November 26, 2019 / Updated: February 7, 2020
Ruby
Ruby
Description
The vulnerability allows a remote attacker to bypass certain security restrictions.
The vulnerability exists in Ruby due to insufficient validation of user-supplied files within File.fnmatch and File.fnmatch? functions when processing NUL byte in the filename. A remote attacker can bypass implemented security restrictions and gain unauthorized access to the system.
Remediation
External links
- https://hackerone.com/reports/44961
- https://www.ruby-lang.org/en/news/2019/10/01/ruby-2-4-8-released/
- https://www.ruby-lang.org/en/news/2019/10/01/ruby-2-5-7-released/
- https://www.ruby-lang.org/en/news/2019/10/01/ruby-2-6-5-released/
- https://www.ruby-lang.org/en/news/2019/10/01/nul-injection-file-fnmatch-cve-2019-15845/