Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1492012 - (CVE-2017-10784) CVE-2017-10784 ruby: Escape sequence injection vulnerability in the Basic authentication of WEBrick
CVE-2017-10784 ruby: Escape sequence injection vulnerability in the Basic aut...
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
impact=moderate,public=20170914,repor...
: Security
Depends On: 1492016 1492017 1509448 1509449 1509450 1509451 1534437 1534438 1534937 1534941
Blocks: 1492024
  Show dependency treegraph
 
Reported: 2017-09-15 05:30 EDT by Adam Mariš
Modified: 2018-03-26 06:23 EDT (History)
30 users (show)

See Also:
Fixed In Version: ruby 2.2.8, ruby 2.3.5, ruby 2.4.2
Doc Type: If docs needed, set a value
Doc Text:
It was found that WEBrick did not sanitize all its log messages. If logs were printed in a terminal, an attacker could interact with the terminal via the use of escape sequences.
Story Points: ---
Clone Of:
Environment:
Last Closed: 2017-12-19 07:59:59 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:3485 normal SHIPPED_LIVE Moderate: rh-ruby24-ruby security, bug fix, and enhancement update 2017-12-19 08:37:01 EST
Red Hat Product Errata RHSA-2018:0378 normal SHIPPED_LIVE Important: ruby security update 2018-02-28 20:06:17 EST
Red Hat Product Errata RHSA-2018:0583 None None None 2018-03-26 05:45 EDT
Red Hat Product Errata RHSA-2018:0585 None None None 2018-03-26 06:23 EDT

  None (edit)
Description Adam Mariš 2017-09-15 05:30:28 EDT
There is an escape sequence injection vulnerability in the Basic authentication of WEBrick bundled by Ruby. When using the Basic authentication of WEBrick, clients can pass an arbitrary string as the user name. WEBrick outputs the passed user name intact to its log, then an attacker can inject malicious escape sequences to the log and dangerous control characters may be executed on a victim’s terminal emulator.

External References:

https://www.ruby-lang.org/en/news/2017/09/14/webrick-basic-auth-escape-sequence-injection-cve-2017-10784/
Comment 1 Adam Mariš 2017-09-15 05:37:55 EDT
Created ruby tracking bugs for this issue:

Affects: fedora-all [bug 1492016]


Created ruby193-ruby tracking bugs for this issue:

Affects: openshift-1 [bug 1492017]
Comment 2 Fedora Update System 2017-10-02 10:24:54 EDT
ruby-2.4.2-84.fc27 has been pushed to the Fedora 27 stable repository. If problems still persist, please make note of it in this bug report.
Comment 7 Cedric Buissart 2017-11-28 08:00:28 EST
Upstream commit: 
https://svn.ruby-lang.org/cgi-bin/viewvc.cgi?view=revision&revision=59897
Comment 8 errata-xmlrpc 2017-12-19 03:38:32 EST
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 6
  Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS

Via RHSA-2017:3485 https://access.redhat.com/errata/RHSA-2017:3485
Comment 9 Cedric Buissart 2017-12-19 08:00:16 EST
Statement:

This issue affects the versions of ruby as shipped with Red Hat Enterprise Linux 5, 6, and 7, as well as the versions of rh-ruby22-ruby and  rh-ruby23-ruby as shipped with Red Hat Software Collections 3. Red Hat Product Security has rated this issue as having Moderate security impact. A future update may address this issue. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/.
Comment 11 errata-xmlrpc 2018-02-28 15:02:45 EST
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2018:0378 https://access.redhat.com/errata/RHSA-2018:0378
Comment 13 errata-xmlrpc 2018-03-26 05:45:38 EDT
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 6
  Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS

Via RHSA-2018:0583 https://access.redhat.com/errata/RHSA-2018:0583
Comment 14 errata-xmlrpc 2018-03-26 06:23:45 EDT
This issue has been addressed in the following products:

  Red Hat Software Collections for Red Hat Enterprise Linux 6
  Red Hat Software Collections for Red Hat Enterprise Linux 6.7 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7
  Red Hat Software Collections for Red Hat Enterprise Linux 7.3 EUS
  Red Hat Software Collections for Red Hat Enterprise Linux 7.4 EUS

Via RHSA-2018:0585 https://access.redhat.com/errata/RHSA-2018:0585

Note You need to log in before you can comment on or make changes to this bug.