Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
32 changes: 32 additions & 0 deletions rubies/ruby/CVE-2011-3624.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,32 @@
---
engine: ruby
cve: 2011-3624
ghsa: rc82-v3mm-rhj2
url: https://nvd.nist.gov/vuln/detail/CVE-2011-3624
title: Various methods in WEBrick::HTTPRequest in Ruby 1.9.2 and 1.8.7
date: 2019-11-25
description: |
Various methods in WEBrick::HTTPRequest in Ruby
1.9.2-p290 and 1.8.7-p352 and earlier do not validate the
X-Forwarded-For, X-Forwarded-Host and X-Forwarded-Server headers in
requests, which might allow remote attackers to inject arbitrary text
into log files or bypass intended address parsing via a crafted header.

## Can only have one "notes:" field for adding these notes here:
- https://redmine.ruby-lang.org/issues/5418 mentioned CVE-2011-3187
- https://webservsec.blogspot.com/2011/02/ruby-on-rails-vulnerability.html
- https://redmine.ruby-lang.org/issues/5418 says:
- "WEBrick has been removed from ruby repository. If anyone interest
this, Please file this to https://github.com/ruby/webrick"
- Unclear when or if this was patched.
cvss_v2: 5.0
cvss_v3: 5.3
notes: Never patched
related:
url:
- https://nvd.nist.gov/vuln/detail/CVE-2011-3624
- https://access.redhat.com/security/cve/cve-2011-3624
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-3624
- https://security-tracker.debian.org/tracker/CVE-2011-3624
- https://github.com/ruby/webrick
- https://github.com/advisories/GHSA-rc82-v3mm-rhj2
21 changes: 21 additions & 0 deletions rubies/ruby/CVE-2016-2336.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,21 @@
---
engine: ruby
cve: 2016-2336
ghsa: f46g-7w88-2qv4
url: https://nvd.nist.gov/vuln/detail/CVE-2016-2336
title: Type confusion exists in ole_invoke and ole_query_interface
methods of Ruby's WIN32OLE class
date: 2017-01-06
description: |
Type confusion exists in two methods of Ruby's WIN32OLE class,
ole_invoke and ole_query_interface.
Attacker passing different type of object than this assumed by
developers can cause arbitrary code execution.
cvss_v2: 7.5
cvss_v3: 9.8
notes: "Never patched"
related:
url:
- https://nvd.nist.gov/vuln/detail/CVE-2016-2336
- http://www.talosintelligence.com/reports/TALOS-2016-0029
- https://github.com/advisories/GHSA-f46g-7w88-2qv4