GHSA-5h5r-ffc4-c455

Suggest an improvement
Source
https://github.com/advisories/GHSA-5h5r-ffc4-c455
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2019/07/GHSA-5h5r-ffc4-c455/GHSA-5h5r-ffc4-c455.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-5h5r-ffc4-c455
Aliases
  • CVE-2019-13354
Published
2019-07-08T20:32:35Z
Modified
2023-11-08T04:01:08.215454Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
strong_password Ruby gem malicious version causing Remote Code Execution vulnerability
Details

The strong_password gem 0.0.7 for Ruby, as distributed on RubyGems.org, included a code-execution backdoor inserted by a third party. Version 0.0.8 does not contain the backdoor.

Database specific
{
    "nvd_published_at": "2019-07-08T14:15:10Z",
    "cwe_ids": [
        "CWE-94"
    ],
    "severity": "CRITICAL",
    "github_reviewed": true,
    "github_reviewed_at": "2019-07-08T20:32:08Z"
}
References

Affected packages

RubyGems / strong_password

Package

Name
strong_password
Purl
pkg:gem/strong_password

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0.0.7
Fixed
0.0.8

Affected versions

0.*

0.0.7