Sha256: 43109e390b6f5bdfc5e02ae943f1de2136d66ae8eea3f449cd97a8ca7d6c300c

Contents?: true

Size: 543 Bytes

Versions: 2

Compression:

Stored size: 543 Bytes

Contents

---
library: rubygems
cve: 2019-8323
url: https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html
title: Escape sequence injection vulnerability in api response handling
date: 2019-03-05
description: |
  An issue was discovered in RubyGems 2.6 and later through 3.0.2.
  Gem::GemcutterUtilities#with_response may output the API response to stdout
  as it is. Therefore, if the API side modifies the response, escape sequence
  injection may occur.
unaffected_versions:
  - "< 2.6"
patched_versions:
  - ">= 3.0.3"
  - "~> 2.7.9"

Version data entries

2 entries across 2 versions & 1 rubygems

Version Path
bundler-budit-0.6.2 data/ruby-advisory-db/libraries/rubygems/CVE-2019-8323.yml
bundler-budit-0.6.1 data/ruby-advisory-db/libraries/rubygems/CVE-2019-8323.yml