CVE-2019-16255

Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows code injection if the first argument (aka the "command" argument) to Shell#[] or Shell#test in lib/shell.rb is untrusted data. An attacker can exploit this to call an arbitrary Ruby method.
Code Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
8.1 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 81%
VendorProductVersion
ruby-langruby
2.4.0 ≤
𝑥
≤ 2.4.7
ruby-langruby
2.5.0 ≤
𝑥
≤ 2.5.6
ruby-langruby
2.6.0 ≤
𝑥
≤ 2.6.4
debiandebian_linux
8.0
debiandebian_linux
9.0
opensuseleap
15.1
oraclegraalvm
19.3.0.2
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
jruby
bookworm
9.3.9.0+ds-8
fixed
sid
9.4.8.0+ds-1
fixed
trixie
9.4.8.0+ds-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
jruby
noble
needs-triage
mantic
ignored
lunar
ignored
impish
ignored
hirsute
ignored
groovy
ignored
focal
needs-triage
eoan
ignored
disco
ignored
bionic
needs-triage
xenial
needs-triage
trusty
Fixed 1.5.6-9+deb8u2build0.14.04.1~esm2
released
ruby2.3
noble
dne
mantic
dne
lunar
dne
kinetic
dne
jammy
dne
impish
dne
hirsute
dne
groovy
dne
focal
dne
eoan
dne
disco
dne
bionic
dne
xenial
Fixed 2.3.1-2~ubuntu16.04.14
released
trusty
dne
ruby2.5
noble
dne
mantic
dne
lunar
dne
kinetic
dne
jammy
dne
impish
dne
hirsute
dne
groovy
dne
focal
dne
eoan
Fixed 2.5.5-4ubuntu2.1
released
disco
Fixed 2.5.5-1ubuntu1.1
released
bionic
Fixed 2.5.1-1ubuntu1.6
released
xenial
dne
trusty
dne
References