CVE-2022-29176
CVSS V2 Medium 6
CVSS V3 High 7.5
Description
Rubygems is a package registry used to supply software for the Ruby language ecosystem. Due to a bug in the yank action, it was possible for any RubyGems.org user to remove and replace certain gems even if that user was not authorized to do so. To be vulnerable, a gem needed: one or more dashes in its name creation within 30 days OR no updates for over 100 days At present, we believe this vulnerability has not been exploited. RubyGems.org sends an email to all gem owners when a gem version is published or yanked. We have not received any support emails from gem owners indicating that their gem has been yanked without authorization. An audit of gem changes for the last 18 months did not find any examples of this vulnerability being used in a malicious way. A deeper audit for any possible use of this exploit is ongoing, and we will update this advisory once it is complete. Using Bundler in --frozen or --deployment mode in CI and during deploys, as the Bundler team has always recommended, will guarantee that your application does not silently switch to versions created using this exploit. To audit your application history for possible past exploits, review your Gemfile.lock and look for gems whose platform changed when the version number did not change. For example, gemname-3.1.2 updating to gemname-3.1.2-java could indicate a possible abuse of this vulnerability. RubyGems.org has been patched and is no longer vulnerable to this issue as of the 5th of May 2022.
Overview
- CVE ID
- CVE-2022-29176
- Assigner
- security-advisories@github.com
- Vulnerability Status
- Analyzed
- Published Version
- 2022-05-05T22:15:08
- Last Modified Date
- 2023-02-10T17:01:31
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:rubygems:rubygems.org:-:*:*:*:*:*:*:* | 1 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:N/AC:M/Au:S/C:P/I:P/A:P
- Access Vector
- NETWORK
- Access Compatibility
- MEDIUM
- Authentication
- SINGLE
- Confidentiality Impact
- PARTIAL
- Integrity Impact
- PARTIAL
- Availability Impact
- PARTIAL
- Base Score
- 6
- Severity
- MEDIUM
- Exploitability Score
- 6.8
- Impact Score
- 6.4
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
- Attack Vector
- NETWORK
- Attack Compatibility
- HIGH
- Privileges Required
- LOW
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- HIGH
- Availability Impact
- HIGH
- Base Score
- 7.5
- Base Severity
- HIGH
- Exploitability Score
- 1.6
- Impact Score
- 5.9
References
Reference URL | Reference Tags |
---|---|
https://github.com/rubygems/rubygems.org/security/advisories/GHSA-hccv-rwq6-vh79 | Mitigation Third Party Advisory |
https://hackerone.com/bugs?subject=rubygems&report_id=1559856 | Permissions Required Third Party Advisory |
https://security.netapp.com/advisory/ntap-20220616-0002/ |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2022-29176 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-29176 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-08 06:18:59 | Added to TrackCVE | |||
2023-02-11 03:15:27 | 2023-02-10T17:01:31 | CVE Modified Date | updated | |
2023-02-11 03:15:27 | Undergoing Analysis | Analyzed | Vulnerability Status | updated |
2023-02-11 03:15:28 | Weakness Enumeration | update |