Dependency Report
Raw Location Data:🟧 Uncontrolled Resource Consumption in addressable
Description
Addressable is an alternative implementation to the URI implementation that is part of Ruby's standard library. An uncontrolled resource consumption vulnerability exists Within the URI template implementation in Addressable, a maliciously crafted template may result in uncontrolled resource consumption, leading to denial of service when matched against a URI. In typical usage, templates would not normally be read from untrusted user input, but nonetheless, no previous security advisory for Addressable has cautioned against doing this. Users of the parsing capabilities in Addressable but not the URI template capabilities are unaffected. The vulnerability is patched As a workaround, only create Template objects from trusted sources that have been validated not to produce catastrophic backtracking.
Solution
Upgrade to version 2.8.0 or above.
Severity
High
CVE
Gemfile.lock:addressable:gemnasium:c6b7051f-d938-48b6-8a3a-ddf35c8f96f9
Identifiers
Gemnasium-c6b7051f-d938-48b6-8a3a-ddf35c8f96f9, CVE-2021-32740
Links
https://nvd.nist.gov/vuln/detail/CVE-2021-32740
{
"file": "Gemfile.lock",
"dependency": {
"package": {
"name": "addressable"
},
"version": "2.5.2"
}
}
Raw Location Data:🟨 OS Command Injection in rake
Description
There is an OS command injection vulnerability in Ruby Rake in
Rake::FileList
when supplying a filename that begins with the pipe character `
Solution
Upgrade to version 12.3.3 or above.
Severity
Medium
CVE
Gemfile.lock:rake:gemnasium:c1b2e6f9-89e0-4903-b140-8f8860bffa36
Identifiers
Gemnasium-c1b2e6f9-89e0-4903-b140-8f8860bffa36, CVE-2020-8130
Links
https://nvd.nist.gov/vuln/detail/CVE-2020-8130
{
"file": "Gemfile.lock",
"dependency": {
"package": {
"name": "rake"
},
"version": "12.3.2"
}
}