Versio.io

CVE-2020-36327

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 29-04-2021 05:15
Last modified: - 05-04-2022 08:06
Total changes: - 5

Description

Bundler 1.16.0 through 2.2.9 and 2.2.11 through 2.2.16 sometimes chooses a dependency source based on the highest gem version number, which means that a rogue gem found at a public source may be chosen, even if the intended choice was a private gem that is a dependency of another private gem that is explicitly depended on by the application. NOTE: it is not correct to use CVE-2021-24105 for every "Dependency Confusion" issue in every product.

Common Vulnerability Scoring System (CVSS)

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Low
Attack complexity
Network
Attack vector
High
Availability
High
Confidentiality
High
Integrity
None
Privileges required
Unchanged
Scope
Required
User interaction
8.8
Base score
2.8
5.9
Exploitability score
Impact score
 

Verification logic

OR
OR
vendor=bundler AND product=bundler AND target_software=ruby AND versionStartIncluding=1.16.0 AND versionEndExcluding=2.2.10
vendor=bundler AND product=bundler AND target_software=ruby AND versionEndIncluding=2.2.16 AND versionStartIncluding=2.2.11
OR
vendor=fedoraproject AND product=fedora AND version=34
OR
vendor=microsoft AND product=package_manager_configurations AND version=-
 

Reference

 


Keywords

NVD

 

CVE-2020-36327

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.