Ruby JSON gem 输入验证错误漏洞

admin 2024-01-14 17:24:43 YS 来源:ZONE.CI 全球网 0 阅读模式
> Ruby JSON gem 输入验证错误漏洞

Ruby JSON gem 输入验证错误漏洞

CNNVD-ID编号 CNNVD-202003-1294 CVE编号 CVE-2020-10663
发布时间 2020-03-20 更新时间 2021-01-07
漏洞类型 输入验证错误 漏洞来源 N/A
危险等级 高危 威胁类型 远程
厂商 N/A

漏洞介绍

Ruby JSON gem是一款基于Ruby的用于从文本解析JSON以及从Ruby对象生成JSON文本的软件包。

Ruby JSON gem 2.2.0及之前版本(使用在Ruby 2.4版本至2.4.9版本、2.5版本至2.5.7版本和2.6版本至2.6.5版本)中存在安全漏洞。攻击者可利用该漏洞在目标系统中强制创建任意对象。

漏洞补丁

目前厂商已发布升级了Ruby JSON gem 输入验证错误漏洞的补丁,Ruby JSON gem 输入验证错误漏洞的补丁获取链接:

参考网址

来源:CONFIRM

链接:https://support.apple.com/kb/HT211931

来源:MLIST

链接:https://lists.apache.org/thread.html/rb2b981912446a74e14fe6076c4b7c7d8502727ea0718e6a65a9b1be5@%3Cissues.zookeeper.apache.org%3E

来源:MLIST

链接:https://lists.apache.org/thread.html/rd9b9cc843f5cf5b532bdad9e87a817967efcf52b917e8c43b6df4cc7@%3Cissues.zookeeper.apache.org%3E

来源:MLIST

链接:https://lists.apache.org/thread.html/rb023d54a46da1ac0d8969097f5fecc79636b07d3b80db7b818a5c55c@%3Cissues.zookeeper.apache.org%3E

来源:MLIST

链接:https://lists.apache.org/thread.html/r5f17bfca1d6e7f4b33ae978725b2fd62a9f1b3111696eafa9add802d@%3Cissues.zookeeper.apache.org%3E

来源:MLIST

链接:https://lists.debian.org/debian-lts-announce/2020/04/msg00030.html

来源:FULLDISC

链接:http://seclists.org/fulldisclosure/2020/Dec/32

来源:FEDORA

链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/7QL6MJD2BO4IRJ5CJFNMCDYMQQFT24BJ/

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00004.html

来源:MLIST

链接:https://lists.apache.org/thread.html/r8d2e174230f6d26e16c007546e804c343f1f68956f526daaafa4aaae@%3Cdev.zookeeper.apache.org%3E

来源:MLIST

链接:https://lists.apache.org/thread.html/ree3abcd33c06ee95ab59faa1751198a1186d8941ddc2c2562c12966c@%3Cissues.zookeeper.apache.org%3E

来源:CONFIRM

链接:https://www.ruby-lang.org/en/news/2020/03/19/json-dos-cve-2020-10663/

来源:FEDORA

链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/NK2PBXWMFRUD7U7Q7LHV4KYLYID77RI4/

来源:MLIST

链接:https://lists.apache.org/thread.html/rec8bb4d637b04575da41cfae49118e108e95d43bfac39b7b698ee4db@%3Cissues.zookeeper.apache.org%3E

来源:FEDORA

链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/F4TNVTT66VPRMX5UZYSDGSVRXKKDDDU5/

来源:DEBIAN

链接:https://www.debian.org/security/2020/dsa-4721

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.1467/

来源:vigilance.fr

链接:https://vigilance.fr/vulnerability/ruby-json-memory-corruption-32118

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.1405/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2182/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.1580/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2023/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.4060/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/158184/Red-Hat-Security-Advisory-2020-2670-01.html

来源:nvd.nist.gov

链接:https://nvd.nist.gov/vuln/detail/CVE-2020-10663

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/160545/Apple-Security-Advisory-2020-12-14-4.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.2335/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.1638/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/158023/Red-Hat-Security-Advisory-2020-2462-01.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.4060.2/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.1331/

受影响实体

暂无

信息来源

http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-202003-1294

weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论:0   参与:  0