Vulnerability CVE-2017-17405: Information

Description

Ruby before 2.4.3 allows Net::FTP command injection. Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file. If the localfile argument starts with the "|" pipe character, the command following the pipe character is executed. The default value of localfile is File.basename(remotefile), so malicious FTP servers could cause arbitrary command execution.

Severity: HIGH (8.8) Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Published: Dec. 15, 2017
Modified: Sept. 19, 2019
Error type identifier: CWE-78

Fixed packages

Package name
Branch
Fixed in version
Version from repository
Errata ID
Task #
State
rubysisyphus2.5.0-alt13.1.4-alt4.3ALT-PU-2018-1418-1201383Fixed
rubyp102.5.0-alt13.1.4-alt2.p10.1ALT-PU-2018-1418-1201383Fixed
rubyp92.5.0-alt12.5.9-alt1ALT-PU-2018-1418-1201383Fixed
rubyp82.5.1-alt0.M80P.12.5.1-alt0.M80P.1ALT-PU-2018-1698-1203032Fixed
rubyc10f12.5.0-alt12.7.4-alt2.2.1ALT-PU-2018-1418-1201383Fixed
rubyc9f22.5.0-alt12.7.6-alt0.1.c9f2ALT-PU-2018-1418-1201383Fixed
rubyc72.4.3-alt0.M70C.12.4.4-alt0.M70C.1ALT-PU-2018-1228-1200650Fixed

References to Advisories, Solutions, and Tools

Hyperlink
Resource
https://www.ruby-lang.org/en/news/2017/12/14/ruby-2-4-3-released/
  • Patch
  • Release Notes
  • Vendor Advisory
https://www.ruby-lang.org/en/news/2017/12/14/net-ftp-command-injection-cve-2017-17405/
  • Vendor Advisory
102204
  • Third Party Advisory
  • VDB Entry
43381
  • Exploit
  • Third Party Advisory
  • VDB Entry
[debian-lts-announce] 20171225 [SECURITY] [DLA 1221-1] ruby1.9.1 security update
  • Mailing List
  • Third Party Advisory
[debian-lts-announce] 20171225 [SECURITY] [DLA 1222-1] ruby1.8 security update
  • Mailing List
  • Third Party Advisory
RHSA-2018:0378
  • Third Party Advisory
RHSA-2018:0585
  • Third Party Advisory
RHSA-2018:0584
  • Third Party Advisory
RHSA-2018:0583
  • Third Party Advisory
[debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
  • Mailing List
  • Third Party Advisory
DSA-4259
  • Third Party Advisory
1042004
  • Third Party Advisory
  • VDB Entry
RHSA-2019:2806
      1. Configuration 1

        cpe:2.3:a:ruby-lang:ruby:2.5.0:preview1:*:*:*:*:*:*

        cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
        Start including
        2.4
        End including
        2.4.2

        cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
        Start including
        2.2
        End including
        2.2.8

        cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*
        Start including
        2.3
        End including
        2.3.5

        Configuration 2

        cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

        cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*

        cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

        Configuration 3

        cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*

        cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*

        cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*

        cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*

        cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*

        cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*

        cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*

        cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*

        cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*

        cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*