Sha256: 1f330bc2a3ff187b734076baf547ab6987067090611fd46df24180ea5ffcb0bb

Contents?: true

Size: 604 Bytes

Versions: 1

Compression:

Stored size: 604 Bytes

Contents

---
gem: strong_password
cve: 2019-13354
url: https://withatwist.dev/strong-password-rubygem-hijacked.html
title: strong_password Ruby gem malicious version causing Remote Code Execution vulnerability
date: 2019-07-05

description: |
  The `strong_password` gem on RubyGems.org was hijacked by a malicious actor. The
  malicious actor published v0.0.7 containing malicious code that enables an attacker
  to execute remote code in production.

  Upgrade `strong_password` to v0.0.8 to ensure no malicious code execution is possible.

patched_versions:
  - ">= 0.0.8"

unaffected_versions:
  - "!= 0.0.7"

Version data entries

1 entries across 1 versions & 1 rubygems

Version Path
bundler-audit-0.7.0.1 data/ruby-advisory-db/gems/strong_password/CVE-2019-13354.yml