Ruby/rdoc/6.3.0
RDoc produces HTML and command-line documentation for Ruby projects. RDoc includes the +rdoc+ and +ri+ tools for generating and displaying documentation from the command-line.
https://rubygems.org/gems/rdoc
Ruby
2 Security Vulnerabilities
Arbitrary Code Execution in Rdoc
- https://nvd.nist.gov/vuln/detail/CVE-2021-31799
- https://github.com/advisories/GHSA-ggxm-pgc9-g7fp
- https://github.com/ruby/rdoc/commit/a7f5d6ab88632b3b482fe10611382ff73d14eed7
- https://security-tracker.debian.org/tracker/CVE-2021-31799
- https://www.ruby-lang.org/en/news/2021/05/02/os-command-injection-in-rdoc/
- https://security.netapp.com/advisory/ntap-20210902-0004/
- https://lists.debian.org/debian-lts-announce/2021/10/msg00009.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rdoc/CVE-2021-31799.yml
- https://security.gentoo.org/glsa/202401-05
In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby through 3.0.1, it is possible to execute arbitrary code via | and tags in a filename.
RDoc OS command injection vulnerability
RDoc used to call Kernel#open
to open a local file. If a Ruby project has
a file whose name starts with |
and ends with tags
, the command following
the pipe character is executed. A malicious Ruby project could exploit it to
run an arbitrary command execution against a user who attempts to run rdoc
command.
101 Other Versions
Version | License | Security | Released | |
---|---|---|---|---|
2.0.0 | UNKNOWN | 2 | 2009-07-25 - 18:00 | about 15 years |