Skip to content

Commit 76d1b03

Browse files
authored
Updated 2019-10842 with cve text.
1 parent ab525ab commit 76d1b03

1 file changed

Lines changed: 13 additions & 6 deletions

File tree

gems/bootstrap-sass/CVE-2019-10842.yml

Lines changed: 13 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -5,12 +5,19 @@ url: https://github.com/twbs/bootstrap-sass/issues/1195
55
title: Remote code execution in bootstrap-sass
66
date: 2019-04-04
77

8-
description: >-
9-
bootstrap-sass is a Sass-powered version of Bootstrap 3, ready to drop right
10-
into your Sass powered applications. Affected versions of this package are
11-
malicious. The file `lib/active-controller/middleware.rb` contains a backdoor
12-
which will enable a remote attacker to run arbitrary code on the server by
13-
decoding a specific cookie value and evaluating its content.
8+
description: |
9+
Arbitrary code execution (via backdoor code, when
10+
downloaded from rubygems.org) was discovered in
11+
bootstrap-sass 3.2.0.3.
12+
13+
Users are advised to upgrade immediately to 3.2.0.4
14+
15+
An unauthenticated attacker can craft the ___cfduid cookie value
16+
with base64 arbitrary code to be executed via eval(), which can
17+
be leveraged to execute arbitrary code on the target system.
18+
(Note that there are three underscore characters in the cookie name.
19+
This is unrelated to the __cfduid cookie that is legitimately used by
20+
Cloudflare.)
1421
1522
unaffected_versions:
1623
- "<= 3.2.0.2"

0 commit comments

Comments
 (0)