CVE Vulnerabilities

CVE-2017-17790

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Published: Dec 20, 2017 | Modified: Apr 20, 2025
CVSS 3.x
9.8
CRITICAL
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
7.5 HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
8.1 LOW
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The lazy_initialize function in lib/resolv.rb in Ruby through 2.4.3 uses Kernel#open, which might allow Command Injection attacks, as demonstrated by a Resolv::Hosts::new argument beginning with a | character, a different vulnerability than CVE-2017-17405. NOTE: situations with untrusted input may be highly unlikely.

Weakness

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

Affected Software

NameVendorStart VersionEnd Version
RubyRuby-lang2.2 (including)2.2.8 (including)
RubyRuby-lang2.3 (including)2.3.5 (including)
RubyRuby-lang2.4 (including)2.4.2 (including)
RubyRuby-lang2.5.0-preview1 (including)2.5.0-preview1 (including)
Red Hat Enterprise Linux 7RedHatruby-0:2.0.0.648-33.el7_4*
Red Hat Software Collections for Red Hat Enterprise Linux 6RedHatrh-ruby22-ruby-0:2.2.9-19.el6*
Red Hat Software Collections for Red Hat Enterprise Linux 6RedHatrh-ruby24-ruby-0:2.4.3-90.el6*
Red Hat Software Collections for Red Hat Enterprise Linux 6RedHatrh-ruby23-ruby-0:2.3.6-67.el6*
Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUSRedHatrh-ruby22-ruby-0:2.2.9-19.el6*
Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUSRedHatrh-ruby24-ruby-0:2.4.3-90.el6*
Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUSRedHatrh-ruby23-ruby-0:2.3.6-67.el6*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatrh-ruby22-ruby-0:2.2.9-19.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatrh-ruby24-ruby-0:2.4.3-90.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatrh-ruby23-ruby-0:2.3.6-67.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUSRedHatrh-ruby22-ruby-0:2.2.9-19.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUSRedHatrh-ruby24-ruby-0:2.4.3-90.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUSRedHatrh-ruby23-ruby-0:2.3.6-67.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUSRedHatrh-ruby22-ruby-0:2.2.9-19.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUSRedHatrh-ruby24-ruby-0:2.4.3-90.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUSRedHatrh-ruby23-ruby-0:2.3.6-67.el7*
Ruby1.9.1Ubuntutrusty*
Ruby2.3Ubuntuartful*
Ruby2.3Ubuntuesm-infra/xenial*
Ruby2.3Ubuntuxenial*
Ruby2.3Ubuntuzesty*
Ruby2.5Ubuntubionic*
Ruby2.5Ubuntudevel*
Ruby2.5Ubuntuesm-infra/bionic*

Potential Mitigations

References