=========================================================================== ZMCIRT Vulnerability Bulletin ZMC-2021.07.26.0815 ruby-actionpack-page-caching: Multiple vulnerabilities 26th July 2021 =========================================================================== Product: ruby-actionpack-page-caching Publisher: Debian Operating System: Debian GNU/Linux UNIX variants (UNIX, Linux, OSX) Windows Impact/Access: Execute Arbitrary Code/Commands -- Remote/Unauthenticated Create Arbitrary Files -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2020-8159 Original Bulletin: https://www.debian.org/lts/security/2021/dla-2719 Comment: This advisory references vulnerabilities in products which run on platforms other than Debian. It is recommended that administrators running ruby-actionpack-page-caching check for an updated version of the software for their operating system. - --------------------------BEGIN INCLUDED TEXT-------------------- - -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - - ------------------------------------------------------------------------- Debian LTS Advisory DLA-2719-1 debian-lts@lists.debian.org https://www.debian.org/lts/security/ Sylvain Beucler July 23, 2021 https://wiki.debian.org/LTS - - ------------------------------------------------------------------------- Package : ruby-actionpack-page-caching Version : 1.0.2-4+deb9u1 CVE ID : CVE-2020-8159 Debian Bug : 960680 ooooooo_q discovered that the actionpack_page-caching Ruby gem, a static page caching module for Rails, allows an attacker to write arbitrary files to a web server, potentially resulting in remote code execution if the attacker can write unescaped ERB to a view. For Debian 9 stretch, this problem has been fixed in version 1.0.2-4+deb9u1. We recommend that you upgrade your ruby-actionpack-page-caching packages. For the detailed security status of ruby-actionpack-page-caching please refer to its security tracker page at: https://security-tracker.debian.org/tracker/ruby-actionpack-page-caching Further information about Debian LTS security advisories, how to apply these updates to your system and frequently asked questions can be found at: https://wiki.debian.org/LTS ZMCIRT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. ZMCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Internet Email: report@cirt.zm Telephone: 7070 ZMCIRT personnel answer during Zambian business hours which are 8am to 5pm. On call after hours for member emergencies only. ===========================================================================
Copyright @2023 ZAMBIA CIRT