CVE-2016-7954
critical-risk
Published 2016-12-22
Bundler 1.x might allow remote attackers to inject arbitrary Ruby code into an application by leveraging a gem name collision on a secondary source. NOTE: this might overlap CVE-2013-0334.
Do I need to act?
~
2.8% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (20)
Bundler
Bundler
Bundler
Bundler
Bundler
Bundler
Bundler
Bundler
Bundler
Bundler
Bundler
Bundler
Bundler
Bundler
Bundler
Bundler
Bundler
Bundler
Bundler
Bundler
Affected Vendors
References (16)
Third Party Advisory
http://www.securityfocus.com/bid/93423
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1381951
Issue Tracking
https://github.com/bundler/bundler/issues/5051
Issue Tracking
https://github.com/bundler/bundler/issues/5062
Third Party Advisory
http://www.securityfocus.com/bid/93423
Issue Tracking
https://bugzilla.redhat.com/show_bug.cgi?id=1381951
Issue Tracking
https://github.com/bundler/bundler/issues/5051
Issue Tracking
https://github.com/bundler/bundler/issues/5062
71
/ 100
critical-risk
Severity
32/34 · Critical
Exploitability
6/34 · Minimal
Exposure
33/34 · Critical