CVE Vulnerabilities

CVE-2017-10784

Improper Authentication

Published: Sep 19, 2017 | Modified: Nov 21, 2024
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS 2.x
9.3 HIGH
AV:N/AC:M/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
5.4 MODERATE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
Ubuntu
MEDIUM

The Basic authentication code in WEBrick library in Ruby before 2.2.8, 2.3.x before 2.3.5, and 2.4.x through 2.4.1 allows remote attackers to inject terminal emulator escape sequences into its log and possibly execute arbitrary commands via a crafted user name.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

Name Vendor Start Version End Version
Ruby Ruby-lang * 2.2.7 (including)
Ruby Ruby-lang 2.3.0 (including) 2.3.0 (including)
Ruby Ruby-lang 2.3.0-preview1 (including) 2.3.0-preview1 (including)
Ruby Ruby-lang 2.3.0-preview2 (including) 2.3.0-preview2 (including)
Ruby Ruby-lang 2.3.1 (including) 2.3.1 (including)
Ruby Ruby-lang 2.3.2 (including) 2.3.2 (including)
Ruby Ruby-lang 2.3.3 (including) 2.3.3 (including)
Ruby Ruby-lang 2.3.4 (including) 2.3.4 (including)
Ruby Ruby-lang 2.4.0 (including) 2.4.0 (including)
Ruby Ruby-lang 2.4.0-preview1 (including) 2.4.0-preview1 (including)
Ruby Ruby-lang 2.4.0-preview2 (including) 2.4.0-preview2 (including)
Ruby Ruby-lang 2.4.0-preview3 (including) 2.4.0-preview3 (including)
Ruby Ruby-lang 2.4.0-rc1 (including) 2.4.0-rc1 (including)
Ruby Ruby-lang 2.4.1 (including) 2.4.1 (including)
Red Hat Enterprise Linux 7 RedHat ruby-0:2.0.0.648-33.el7_4 *
Red Hat Software Collections for Red Hat Enterprise Linux 6 RedHat rh-ruby24-ruby-0:2.4.2-86.el6 *
Red Hat Software Collections for Red Hat Enterprise Linux 6 RedHat rh-ruby22-ruby-0:2.2.9-19.el6 *
Red Hat Software Collections for Red Hat Enterprise Linux 6 RedHat rh-ruby23-ruby-0:2.3.6-67.el6 *
Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS RedHat rh-ruby24-ruby-0:2.4.2-86.el6 *
Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS RedHat rh-ruby22-ruby-0:2.2.9-19.el6 *
Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS RedHat rh-ruby23-ruby-0:2.3.6-67.el6 *
Red Hat Software Collections for Red Hat Enterprise Linux 7 RedHat rh-ruby24-ruby-0:2.4.2-86.el7 *
Red Hat Software Collections for Red Hat Enterprise Linux 7 RedHat rh-ruby22-ruby-0:2.2.9-19.el7 *
Red Hat Software Collections for Red Hat Enterprise Linux 7 RedHat rh-ruby23-ruby-0:2.3.6-67.el7 *
Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS RedHat rh-ruby24-ruby-0:2.4.2-86.el7 *
Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS RedHat rh-ruby22-ruby-0:2.2.9-19.el7 *
Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS RedHat rh-ruby23-ruby-0:2.3.6-67.el7 *
Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS RedHat rh-ruby24-ruby-0:2.4.2-86.el7 *
Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS RedHat rh-ruby22-ruby-0:2.2.9-19.el7 *
Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS RedHat rh-ruby23-ruby-0:2.3.6-67.el7 *
Ruby1.9.1 Ubuntu trusty *
Ruby2.0 Ubuntu trusty *
Ruby2.3 Ubuntu artful *
Ruby2.3 Ubuntu xenial *
Ruby2.3 Ubuntu zesty *

Potential Mitigations

References