Openwall GNU/*/Linux - a small security-enhanced Linux distro for servers
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date: Tue, 4 Oct 2016 13:00:22 -0400
From: Steve Richert <steve@...lectiveidea.com>
To: oss-security@...ts.openwall.com
Subject: CVE Request

Hello,

I'd like to request a CVE to track a security vulnerability found in Bundler (bundler.io <http://bundler.io/>). Bundler allows the user to specify sources from which Ruby gems are installed. If a secondary source is specified, even if scoped to a specific gem, that source is silently applied to all declared gems. This allows an attacker to introduce arbitrary code into an application via gem name collision on the secondary source, which will unexpectedly (and without warning) take priority over the primary source.

The issue seems to exist in all 1.x versions of Bundler. Bundler 2 is still in development and seems to resolve the issue. The Bundler team does not currently plan on releasing a patch for 1.x versions.

No CVE has been requested previously that I'm aware of.

Thank you!

Powered by blists - more mailing lists

Your e-mail address:

Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.

Powered by Openwall GNU/*/Linux - Powered by OpenVZ