We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent 41812d7 commit 2ef931cCopy full SHA for 2ef931c
1 file changed
gems/strong_password/CVE-2019-13354.yml
@@ -0,0 +1,16 @@
1
+---
2
+gem: strong_password
3
+cve: 2019-13354
4
+url: https://withatwist.dev/strong-password-rubygem-hijacked.html
5
+title: strong_password Ruby gem malicious version causing Remote Code Execution vulnerability
6
+date: 2019-07-05
7
+
8
+description: |
9
+ The `strong_password` gem on RubyGems.org was hijacked by a malicious actor. The
10
+ malicious actor published v0.0.7 containing malicious code that enables an attacker
11
+ to execute remote code in production.
12
13
+ Downgrade `strong_password` to v0.0.6 to ensure no malicious code execution is possible.
14
15
+unaffected_versions:
16
+ - != 0.0.7
0 commit comments