CVE-2017-10784

NameCVE-2017-10784
DescriptionThe Basic authentication code in WEBrick library in Ruby before 2.2.8, 2.3.x before 2.3.5, and 2.4.x through 2.4.1 allows remote attackers to inject terminal emulator escape sequences into its log and possibly execute arbitrary commands via a crafted user name.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub advisories/code/issues, web search, more)
ReferencesDLA-1113-1, DLA-1114-1, DLA-1421-1, DSA-4031-1
Debian Bugs875931

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
ruby1.8sourcewheezy1.8.7.358-7.1+deb7u4DLA-1113-1
ruby1.8source(unstable)(unfixed)
ruby1.9.1sourcewheezy1.9.3.194-8.1+deb7u6DLA-1114-1
ruby1.9.1source(unstable)(unfixed)
ruby2.1sourcejessie2.1.5-2+deb8u4DLA-1421-1
ruby2.1source(unstable)(unfixed)
ruby2.3sourcestretch2.3.3-1+deb9u2DSA-4031-1
ruby2.3source(unstable)2.3.5-1875931

Notes

https://www.ruby-lang.org/en/news/2017/09/14/webrick-basic-auth-escape-sequence-injection-cve-2017-10784/
https://github.com/ruby/ruby/commit/6617c41292b7d1e097abb8fdb0cab9ddd83c77e7
https://hackerone.com/reports/223363

Search for package or bug name: Reporting problems