Sha256: 43109e390b6f5bdfc5e02ae943f1de2136d66ae8eea3f449cd97a8ca7d6c300c
Contents?: true
Size: 543 Bytes
Versions: 2
Compression:
Stored size: 543 Bytes
Contents
--- library: rubygems cve: 2019-8323 url: https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html title: Escape sequence injection vulnerability in api response handling date: 2019-03-05 description: | An issue was discovered in RubyGems 2.6 and later through 3.0.2. Gem::GemcutterUtilities#with_response may output the API response to stdout as it is. Therefore, if the API side modifies the response, escape sequence injection may occur. unaffected_versions: - "< 2.6" patched_versions: - ">= 3.0.3" - "~> 2.7.9"
Version data entries
2 entries across 2 versions & 1 rubygems
Version | Path |
---|---|
bundler-budit-0.6.2 | data/ruby-advisory-db/libraries/rubygems/CVE-2019-8323.yml |
bundler-budit-0.6.1 | data/ruby-advisory-db/libraries/rubygems/CVE-2019-8323.yml |