Vulnerability Name:

CVE-2022-31163 (CCN-231973)

Assigned:2022-07-19
Published:2022-07-19
Updated:2022-10-26
Summary:TZInfo is a Ruby library that provides access to time zone data and allows times to be converted using time zone rules. Versions prior to 0.36.1, as well as those prior to 1.2.10 when used with the Ruby data source tzinfo-data, are vulnerable to relative path traversal. With the Ruby data source, time zones are defined in Ruby files. There is one file per time zone. Time zone files are loaded with `require` on demand. In the affected versions, `TZInfo::Timezone.get` fails to validate time zone identifiers correctly, allowing a new line character within the identifier. With Ruby version 1.9.3 and later, `TZInfo::Timezone.get` can be made to load unintended files with `require`, executing them within the Ruby process. Versions 0.3.61 and 1.2.10 include fixes to correctly validate time zone identifiers. Versions 2.0.0 and later are not vulnerable. Version 0.3.61 can still load arbitrary files from the Ruby load path if their name follows the rules for a valid time zone identifier and the file has a prefix of `tzinfo/definition` within a directory in the load path. Applications should ensure that untrusted files are not placed in a directory on the load path. As a workaround, the time zone identifier can be validated before passing to `TZInfo::Timezone.get` by ensuring it matches the regular expression `\A[A-Za-z0-9+\-_]+(?:\/[A-Za-z0-9+\-_]+)*\z`.
CVSS v3 Severity:8.1 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H)
7.1 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
7.5 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H)
6.5 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): Required
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:7.1 High (CCN CVSS v2 Vector: AV:N/AC:H/Au:S/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-22
CWE-23
Vulnerability Consequences:Obtain Information
References:Source: MITRE
Type: CNA
CVE-2022-31163

Source: XF
Type: UNKNOWN
tzinfo-cve202231163-dir-traversal(231973)

Source: MISC
Type: Patch, Third Party Advisory
https://github.com/tzinfo/tzinfo/commit/9905ca93abf7bf3e387bd592406e403cd18334c7

Source: MISC
Type: Patch, Third Party Advisory
https://github.com/tzinfo/tzinfo/commit/9eddbb5c0e682736f61d0dd803b6031a5db9eadf

Source: MISC
Type: Release Notes, Third Party Advisory
https://github.com/tzinfo/tzinfo/releases/tag/v0.3.61

Source: MISC
Type: Release Notes, Third Party Advisory
https://github.com/tzinfo/tzinfo/releases/tag/v1.2.10

Source: CCN
Type: TZInfo GIT Repository
Relative path traversal vulnerability allows TZInfo::Timezone.get to load arbitrary files

Source: CONFIRM
Type: Exploit, Third Party Advisory
https://github.com/tzinfo/tzinfo/security/advisories/GHSA-5cm2-9h8c-rvfx

Source: MLIST
Type: Mailing List, Third Party Advisory
[debian-lts-announce] 20220818 [SECURITY] [DLA 3077-1] ruby-tzinfo security update

Vulnerable Configuration:Configuration 1:
  • cpe:/a:tzinfo_project:tzinfo:*:*:*:*:*:*:*:* (Version >= 1.0.0 and < 1.2.10)
  • OR cpe:/a:tzinfo_project:tzinfo:*:*:*:*:*:*:*:* (Version < 0.3.61)

  • Configuration 2:
  • cpe:/o:debian:debian_linux:10.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:3784
    P
    Security update for rubygem-tzinfo (Important)
    2022-07-29
    oval:org.opensuse.security:def:95417
    P
    Security update for rubygem-tzinfo (Important)
    2022-07-29
    oval:org.opensuse.security:def:118652
    P
    Security update for rubygem-tzinfo (Important)
    2022-07-29
    oval:org.opensuse.security:def:612
    P
    Security update for rubygem-tzinfo (Important)
    2022-07-29
    BACK
    tzinfo_project tzinfo *
    tzinfo_project tzinfo *
    debian debian linux 10.0