低危 Ruby JSON gem 输入验证错误漏洞
CVE编号
CVE-2020-10663利用情况
POC 已公开补丁情况
官方补丁披露时间
2020-04-29漏洞描述
Ruby JSON gem是一款基于Ruby的用于从文本解析JSON以及从Ruby对象生成JSON文本的软件包。 Ruby JSON gem 2.2.0及之前版本(使用在Ruby 2.4版本至2.4.9版本、2.5版本至2.5.7版本和2.6版本至2.6.5版本)中存在安全漏洞。攻击者可利用该漏洞在目标系统中强制创建任意对象。解决建议
厂商已发布了漏洞修复程序,请及时关注更新:https://www.ruby-lang.org/en/news/2020/03/19/json-dos-cve-2020-10663/受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | json_project | json | * | Up to (including) 2.2.0 | |||||
运行在以下环境 | |||||||||
应用 | ruby-lang | ruby | * | From (including) 2.4.0 | Up to (including) 2.4.9 | ||||
运行在以下环境 | |||||||||
应用 | ruby-lang | ruby | * | From (including) 2.5.0 | Up to (including) 2.5.7 | ||||
运行在以下环境 | |||||||||
应用 | ruby-lang | ruby | * | From (including) 2.6.0 | Up to (including) 2.6.5 | ||||
运行在以下环境 | |||||||||
系统 | alpine_3.10 | ruby | * | Up to (excluding) 2.5.8-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.11 | ruby | * | Up to (excluding) 2.6.6-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.12 | ruby | * | Up to (excluding) 2.6.6-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.13 | ruby | * | Up to (excluding) 2.6.6-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.14 | ruby | * | Up to (excluding) 2.6.6-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.15 | ruby | * | Up to (excluding) 2.6.6-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.16 | ruby | * | Up to (excluding) 2.6.6-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.17 | ruby | * | Up to (excluding) 2.6.6-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.18 | ruby | * | Up to (excluding) 2.6.6-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_3.7 | ruby | * | Up to (excluding) 2.4.10-r0 | |||||
运行在以下环境 | |||||||||
系统 | alpine_edge | ruby | * | Up to (excluding) 2.6.6-r0 | |||||
运行在以下环境 | |||||||||
系统 | amazon_2 | ruby | * | Up to (excluding) 2.0.0.648-36.amzn2.0.2 | |||||
运行在以下环境 | |||||||||
系统 | amazon_AMI | ruby20 | * | Up to (excluding) 0.9.2.2-33.71.amzn1 | |||||
运行在以下环境 | |||||||||
系统 | anolis_os_8 | rubygem-xmlrpc | * | Up to (excluding) 1.2.0-107 | |||||
运行在以下环境 | |||||||||
系统 | centos_8 | rubygem-bundler | * | Up to (excluding) 2.5.9-107.module+el8.4.0+10822+fe4fffb1 | |||||
运行在以下环境 | |||||||||
系统 | debian_10 | ruby-json | * | Up to (excluding) 2.5.5-3+deb10u2 | |||||
运行在以下环境 | |||||||||
系统 | debian_11 | ruby-json | * | Up to (excluding) 2.7.4-1+deb11u1 | |||||
运行在以下环境 | |||||||||
系统 | debian_12 | ruby-json | * | Up to (excluding) 2.3.0+dfsg-1 | |||||
运行在以下环境 | |||||||||
系统 | debian_8 | ruby-json | * | Up to (excluding) 2.1.5-2+deb8u2 | |||||
运行在以下环境 | |||||||||
系统 | debian_9 | ruby-json | * | Up to (excluding) 2.3.3-1+deb9u8 | |||||
运行在以下环境 | |||||||||
系统 | debian_sid | ruby-json | * | Up to (excluding) 2.3.0+dfsg-1 | |||||
运行在以下环境 | |||||||||
系统 | fedora_30 | rubygem-json-doc | * | Up to (excluding) 2.2.0-202.fc30 | |||||
运行在以下环境 | |||||||||
系统 | fedora_31 | rubygem-json-doc | * | Up to (excluding) 2.6.6-125.fc31 | |||||
运行在以下环境 | |||||||||
系统 | opensuse_Leap_15.1 | ruby2.5-doc-ri | * | Up to (excluding) 2.5.8-lp151.4.9.1 | |||||
运行在以下环境 | |||||||||
系统 | oracle_8 | oraclelinux-release | * | Up to (excluding) 2.5.1-2.module+el8.3.0+7756+e45777e9 | |||||
运行在以下环境 | |||||||||
系统 | redhat_8 | rubygem-bundler | * | Up to (excluding) 2.5.9-107.module+el8.4.0+10822+fe4fffb1 | |||||
运行在以下环境 | |||||||||
系统 | suse_12 | libruby2_1-2_1 | * | Up to (excluding) 2.1.9-19.3 | |||||
运行在以下环境 | |||||||||
系统 | suse_12_SP4 | ruby2.1 | * | Up to (excluding) 2.1.9-19.3.2 | |||||
运行在以下环境 | |||||||||
系统 | suse_12_SP5 | ruby2.1 | * | Up to (excluding) 2.1.9-19.3.2 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04 | ruby2.3 | * | Up to (excluding) 2.3.1-2~ubuntu16.04.15 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_16.04.7_lts | ruby2.3 | * | Up to (excluding) 2.3.1-2~ubuntu16.04.15 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04 | ruby2.5 | * | Up to (excluding) 2.5.1-1ubuntu1.8 | |||||
运行在以下环境 | |||||||||
系统 | ubuntu_18.04.5_lts | ruby2.5 | * | Up to (excluding) 2.5.1-1ubuntu1.8 | |||||
- 攻击路径 远程
- 攻击复杂度 复杂
- 权限要求 无需权限
- 影响范围 有限影响
- EXP成熟度 POC 已公开
- 补丁情况 官方补丁
- 数据保密性 无影响
- 数据完整性 无影响
- 服务器危害 无影响
- 全网数量 100
CWE-ID | 漏洞类型 |
CWE-20 | 输入验证不恰当 |
Exp相关链接
- avd.aliyun.com
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
评论