Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

GSHA SYNC: 1 brand new advisory #805

Merged
merged 1 commit into from
Aug 24, 2024
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
39 changes: 39 additions & 0 deletions gems/request_store/CVE-2024-43791.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,39 @@
---
gem: request_store
cve: 2024-43791
ghsa: frp2-5qfc-7r8m
url: https://github.com/steveklabnik/request_store/security/advisories/GHSA-frp2-5qfc-7r8m
title: request_store has Incorrect Default Permissions
date: 2024-08-23
description: |
### Impact

The files published as part of request_store 1.3.2 have 0666
permissions, meaning that they are world-writable, which allows
local users to execute arbitrary code.

This version was published in 2017, and most production environments
do not allow access for local users, so the chances of this being
exploited are very low, given that the vast majority of users will
have upgraded, and those that have not, if any, are not likely to
be exposed.

### Patches

I am not aware of any other version of the gem with incorrect
permissions, so simply upgrading should fix the issue.

### Workarounds

You could chmod the files yourself, I guess.
cvss_v3: 7.8
unaffected_versions:
- "< 1.3.2"
patched_versions:
- ">= 1.4.0"
related:
url:
- https://nvd.nist.gov/vuln/detail/CVE-2024-43791
- https://github.com/steveklabnik/request_store/security/advisories/GHSA-frp2-5qfc-7r8m
- https://cwe.mitre.org/data/definitions/276.html
- https://github.com/advisories/GHSA-frp2-5qfc-7r8m
Loading