Vulnerability Name: | CVE-2020-36327 (CCN-201080) | ||||||||||||||||||
Assigned: | 2020-09-30 | ||||||||||||||||||
Published: | 2020-09-30 | ||||||||||||||||||
Updated: | 2022-04-05 | ||||||||||||||||||
Summary: | Bundler 1.16.0 through 2.2.9 and 2.2.11 through 2.2.16 sometimes chooses a dependency source based on the highest gem version number, which means that a rogue gem found at a public source may be chosen, even if the intended choice was a private gem that is a dependency of another private gem that is explicitly depended on by the application. Note: it is not correct to use CVE-2021-24105 for every "Dependency Confusion" issue in every product. | ||||||||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
8.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.7 High (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
| ||||||||||||||||||
Vulnerability Type: | CWE-noinfo CWE-494 | ||||||||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-36327 Source: CCN Type: bundler Web site A more secure bundler: We fixed our source priorities. Source: MISC Type: Vendor Advisory https://bundler.io/blog/2021/02/15/a-more-secure-bundler-we-fixed-our-source-priorities.html Source: XF Type: UNKNOWN bundler-cve202036327-code-exec(201080) Source: CCN Type: GitHub Web site Global vs block gem server source priority doesn't work as expected #3982 Source: MISC Type: Exploit, Issue Tracking, Third Party Advisory https://github.com/rubygems/rubygems/issues/3982 Source: FEDORA Type: Mailing List, Third Party Advisory FEDORA-2021-36cdab1f8d Source: MISC Type: Third Party Advisory https://mensfeld.pl/2021/02/rubygems-dependency-confusion-attack-side-of-things/ Source: MISC Type: Patch, Vendor Advisory https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-24105 Source: CCN Type: IBM Security Bulletin 6831813 (Netcool Operations Insight) Netcool Operations Insight v1.6.6 contains fixes for multiple security vulnerabilities. Source: CCN Type: WhiteSource Vulnerability Database CVE-2020-36327 Source: MISC Type: Exploit, Third Party Advisory https://www.zofrex.com/blog/2021/04/29/bundler-still-vulnerable-dependency-confusion-cve-2020-36327/ | ||||||||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration RedHat 1: Configuration RedHat 2: Configuration CCN 1: ![]() | ||||||||||||||||||
Oval Definitions | |||||||||||||||||||
| |||||||||||||||||||
BACK |