CVE-2021-31799
30.07.2021, 14:15
In RDoc 3.11 through 6.x before 6.3.1, as distributed with Ruby through 3.0.1, it is possible to execute arbitrary code via | and tags in a filename.
| Vendor | Product | Version |
|---|---|---|
| debian | debian_linux | 9.0 |
| debian | debian_linux | 10.0 |
| ruby-lang | rdoc | 3.11 ≤ 𝑥 < 6.3.1 |
| oracle | jd_edwards_enterpriseone_tools | 𝑥 < 9.2.6.1 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Ubuntu Product | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| ruby1.9.1 |
| ||||||||||||||||
| ruby2.0 |
| ||||||||||||||||
| ruby2.3 |
| ||||||||||||||||
| ruby2.5 |
| ||||||||||||||||
| ruby2.7 |
|
References