Vulnerability Details : CVE-2016-7954
Bundler 1.x might allow remote attackers to inject arbitrary Ruby code into an application by leveraging a gem name collision on a secondary source. NOTE: this might overlap CVE-2013-0334.
Products affected by CVE-2016-7954
- cpe:2.3:a:bundler:bundler:1.13.6:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.13.0:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.13.0:pre1:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.13.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.12.0:pre1:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.11.1:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.11.2:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.11.0:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.9.3:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.9.4:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.8.3:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.8.4:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.8.5:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.8.6:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.6.5:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.6.6:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.6.7:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.7.13:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.7.14:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.7.15:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.3.0:pre3:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.3.0:pre4:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.3.0:pre5:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.3.0:pre6:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.3.0:pre7:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.13.1:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.12.4:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.12.5:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.12.6:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.12.0:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.12.0:pre2:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.10.3:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.10.4:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.10.5:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.10.6:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.9.9:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.9.10:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.9.0:pre1:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.8.0:pre:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.7.4:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.7.5:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.7.6:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.7.7:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.1:pre3:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.1:pre4:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.1:pre5:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.1:pre6:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.1:pre7:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.0.21:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.0.21:rc:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.0.19:rc:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.0.20:rc:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.0.14:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.0.15:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.0.16:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.0.17:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.0.0:rc6:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.13.2:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.13.4:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.12.3:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.12.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.12.0:rc4:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.11.0:pre2:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.10.0:pre:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.10.0:rc:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.9.6:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.9.8:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.9.0:rc:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.8.1:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.8.8:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.8.0:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.7.0:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.7.2:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.7.9:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.7.11:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.5.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.4.0:pre1:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.3.0:pre8:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.2.0:rc:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.2.0:pre:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.1:pre1:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.1:pre8:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.1:pre10:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.1:rc7:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.1:pre:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.0.20:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.0.0:beta6:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.0.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.0.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.0.0:rc5:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.1:rc2:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.1:rc3:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.1:rc4:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.1:rc5:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.0.0:beta7:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.0.0:beta8:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.0.0:beta9:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.0.0:beta10:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.13.3:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.13.5:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.13.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.12.2:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.12.0:rc:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.12.0:rc3:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.11.0:pre1:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.10.2:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.10.0:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.10.0:pre2:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.10.0:pre1:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.9.5:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.9.7:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.9.0:pre:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.8.2:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.8.7:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.8.9:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.8.0:rc:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.7.3:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.7.8:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.7.10:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.7.12:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.5.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.4.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.3.0:pre2:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.3.0:pre:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.2.0:pre1:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.2.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.1:pre2:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.1:pre9:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.1:rc:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.1:rc6:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.1:rc8:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.0.13:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.0.18:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.0.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.0.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:1.0.0:rc4:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2016-7954
0.88%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 80 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2016-7954
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST | |
9.8
|
CRITICAL | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2016-7954
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-7954
-
http://www.openwall.com/lists/oss-security/2016/10/04/7
oss-security - Re: CVE request for code execution via gem name collission in bundler (was Re: CVE Request)Mailing List;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2016/10/04/5
oss-security - CVE RequestMailing List;Third Party Advisory
-
http://www.securityfocus.com/bid/93423
RubyGems Bundler CVE-2016-7954 Arbitrary Code Execution VulnerabilityThird Party Advisory;VDB Entry
-
https://github.com/bundler/bundler/issues/5051
CVE-2016-7954 secondary sources · Issue #5051 · bundler/bundler · GitHubIssue Tracking;Patch;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2016/10/05/3
oss-security - Re: Re: CVE request for code execution via gem name collission in bundler (was Re: CVE Request)Mailing List;Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=1381951
1381951 – (CVE-2016-7954) CVE-2016-7954 rubygem-bundler: Code execution via gem name collision in bundlerIssue Tracking
-
http://collectiveidea.com/blog/archives/2016/10/06/bundlers-multiple-source-security-vulnerability/
Bundler's Multiple Source Security Vulnerability | Collective IdeaExploit;Third Party Advisory
-
https://github.com/bundler/bundler/issues/5062
Clarify documentation around global sources · Issue #5062 · bundler/bundler · GitHubIssue Tracking;Patch;Third Party Advisory
Jump to