CVE Vulnerabilities

CVE-2017-10784

Improper Authentication

Published: Sep 19, 2017 | Modified: Apr 20, 2025
CVSS 3.x
8.8
HIGH
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS 2.x
9.3 HIGH
AV:N/AC:M/Au:N/C:C/I:C/A:C
RedHat/V2
RedHat/V3
5.4 MODERATE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The Basic authentication code in WEBrick library in Ruby before 2.2.8, 2.3.x before 2.3.5, and 2.4.x through 2.4.1 allows remote attackers to inject terminal emulator escape sequences into its log and possibly execute arbitrary commands via a crafted user name.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

NameVendorStart VersionEnd Version
RubyRuby-lang*2.2.7 (including)
RubyRuby-lang2.3.0 (including)2.3.0 (including)
RubyRuby-lang2.3.0-preview1 (including)2.3.0-preview1 (including)
RubyRuby-lang2.3.0-preview2 (including)2.3.0-preview2 (including)
RubyRuby-lang2.3.1 (including)2.3.1 (including)
RubyRuby-lang2.3.2 (including)2.3.2 (including)
RubyRuby-lang2.3.3 (including)2.3.3 (including)
RubyRuby-lang2.3.4 (including)2.3.4 (including)
RubyRuby-lang2.4.0 (including)2.4.0 (including)
RubyRuby-lang2.4.0-preview1 (including)2.4.0-preview1 (including)
RubyRuby-lang2.4.0-preview2 (including)2.4.0-preview2 (including)
RubyRuby-lang2.4.0-preview3 (including)2.4.0-preview3 (including)
RubyRuby-lang2.4.0-rc1 (including)2.4.0-rc1 (including)
RubyRuby-lang2.4.1 (including)2.4.1 (including)
Red Hat Enterprise Linux 7RedHatruby-0:2.0.0.648-33.el7_4*
Red Hat Software Collections for Red Hat Enterprise Linux 6RedHatrh-ruby24-ruby-0:2.4.2-86.el6*
Red Hat Software Collections for Red Hat Enterprise Linux 6RedHatrh-ruby22-ruby-0:2.2.9-19.el6*
Red Hat Software Collections for Red Hat Enterprise Linux 6RedHatrh-ruby23-ruby-0:2.3.6-67.el6*
Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUSRedHatrh-ruby24-ruby-0:2.4.2-86.el6*
Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUSRedHatrh-ruby22-ruby-0:2.2.9-19.el6*
Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUSRedHatrh-ruby23-ruby-0:2.3.6-67.el6*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatrh-ruby24-ruby-0:2.4.2-86.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatrh-ruby22-ruby-0:2.2.9-19.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatrh-ruby23-ruby-0:2.3.6-67.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUSRedHatrh-ruby24-ruby-0:2.4.2-86.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUSRedHatrh-ruby22-ruby-0:2.2.9-19.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUSRedHatrh-ruby23-ruby-0:2.3.6-67.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUSRedHatrh-ruby24-ruby-0:2.4.2-86.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUSRedHatrh-ruby22-ruby-0:2.2.9-19.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUSRedHatrh-ruby23-ruby-0:2.3.6-67.el7*
Ruby1.9.1Ubuntutrusty*
Ruby2.0Ubuntutrusty*
Ruby2.3Ubuntuartful*
Ruby2.3Ubuntuesm-infra/xenial*
Ruby2.3Ubuntuxenial*
Ruby2.3Ubuntuzesty*

Potential Mitigations

References