CVE-2020-10663
high-risk
Published 2020-04-28
The JSON gem through 2.2.0 for Ruby, as used in Ruby 2.4 through 2.4.9, 2.5 through 2.5.7, and 2.6 through 2.6.5, has an Unsafe Object Creation Vulnerability. This is quite similar to CVE-2013-0269, but does not rely on poor garbage-collection behavior within Ruby. Specifically, use of JSON parsing methods can lead to creation of a malicious object within the interpreter, with adverse effects that are application-dependent.
Do I need to act?
~
7.5% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (7)
Affected Vendors
References (38)
Mailing List
http://seclists.org/fulldisclosure/2020/Dec/32
Third Party Advisory
https://security.netapp.com/advisory/ntap-20210129-0003/
Third Party Advisory
https://support.apple.com/kb/HT211931
Third Party Advisory
https://www.debian.org/security/2020/dsa-4721
and 18 more references
50
/ 100
high-risk
Severity
26/34 · High
Exploitability
10/34 · Low
Exposure
14/34 · Moderate