GHSA-2xvj-j3qh-x8c3

Suggest an improvement
Source
https://github.com/advisories/GHSA-2xvj-j3qh-x8c3
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/07/GHSA-2xvj-j3qh-x8c3/GHSA-2xvj-j3qh-x8c3.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-2xvj-j3qh-x8c3
Aliases
Published
2018-07-31T18:13:05Z
Modified
2024-11-29T05:42:10.115216Z
Summary
private_address_check contains race condition
Details

The privateaddresscheck ruby gem before 0.5.0 is vulnerable to a time-of-check time-of-use (TOCTOU) race condition due to the address the socket uses not being checked. DNS entries with a TTL of 0 can trigger this case where the initial resolution is a public address but the subsequent resolution is a private address.

Database specific
{
    "nvd_published_at": null,
    "cwe_ids": [
        "CWE-362"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2020-06-16T20:53:26Z"
}
References

Affected packages

RubyGems / private_address_check

Package

Name
private_address_check
Purl
pkg:gem/private_address_check

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.5.0

Affected versions

0.*

0.1.0
0.2.0
0.3.0
0.4.0
0.4.1