GHSA-g982-9r8g-6qxw

Suggest an improvement
Source
https://github.com/advisories/GHSA-g982-9r8g-6qxw
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/07/GHSA-g982-9r8g-6qxw/GHSA-g982-9r8g-6qxw.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-g982-9r8g-6qxw
Aliases
  • CVE-2014-5003
Published
2018-07-23T19:50:15Z
Modified
2023-11-01T04:45:42.782188Z
Severity
  • 5.5 (Medium) CVSS_V3 - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
Ciborg gem for Ruby allows local users to write files and gain privileges via Symlink
Details

There is a /tmp file race condition in chef/travis-cookbooks/ci_environment/perlbrew/recipes/default.rb in the ciborg gem 3.0.0 when creating /tmp/perlbrew-installer. If a malicious local user creates the file first they can overwrite the contents with their own code executing it as the ciborg process owner.

Database specific
{
    "nvd_published_at": "2018-01-10T18:29:00Z",
    "cwe_ids": [
        "CWE-20"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2020-06-16T21:36:44Z"
}
References

Affected packages

RubyGems / ciborg

Package

Name
ciborg
Purl
pkg:gem/ciborg

Affected ranges

Affected versions

3.*

3.0.0