Bundler before 1.7, when multiple top-level source lines are used, allows remote attackers to install arbitrary gems by creating a gem with the same name as another gem in a different source.
References
Link | Resource |
---|---|
http://bundler.io/blog/2014/08/14/bundler-may-install-gems-from-a-different-source-than-expected-cve-2013-0334.html | Vendor Advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140609.html | Third Party Advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140654.html | Third Party Advisory |
http://lists.fedoraproject.org/pipermail/package-announce/2014-October/140655.html | Third Party Advisory |
http://lists.opensuse.org/opensuse-updates/2015-03/msg00092.html | Third Party Advisory |
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html | Third Party Advisory |
http://www.securityfocus.com/bid/70099 | Third Party Advisory VDB Entry |
https://security.gentoo.org/glsa/201609-02 | Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2014-10-31T14:00:00
Updated: 2017-06-30T16:57:01
Reserved: 2012-12-06T00:00:00
Link: CVE-2013-0334
JSON object: View
NVD Information
Status : Analyzed
Published: 2014-10-31T14:55:02.687
Modified: 2019-07-16T12:21:06.373
Link: CVE-2013-0334
JSON object: View
Redhat Information
No data.
CWE