Vulnerability Details : CVE-2020-36327
Bundler 1.16.0 through 2.2.9 and 2.2.11 through 2.2.16 sometimes chooses a dependency source based on the highest gem version number, which means that a rogue gem found at a public source may be chosen, even if the intended choice was a private gem that is a dependency of another private gem that is explicitly depended on by the application. NOTE: it is not correct to use CVE-2021-24105 for every "Dependency Confusion" issue in every product.
Products affected by CVE-2020-36327
- cpe:2.3:a:microsoft:package_manager_configurations:-:*:*:*:*:*:*:*
- cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*
- cpe:2.3:a:bundler:bundler:*:*:*:*:*:ruby:*:*
- cpe:2.3:a:bundler:bundler:*:*:*:*:*:ruby:*:*
Exploit prediction scoring system (EPSS) score for CVE-2020-36327
0.88%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 82 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2020-36327
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST | |
8.8
|
HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H |
2.8
|
5.9
|
NIST |
References for CVE-2020-36327
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MWXHK5UUHVSHF7HTHMX6JY3WXDVNIHSL/
Mailing List;Third Party Advisory
-
https://bundler.io/blog/2021/02/15/a-more-secure-bundler-we-fixed-our-source-priorities.html
Bundler: A more secure bundler: We fixed our source priorities.Vendor Advisory
-
https://mensfeld.pl/2021/02/rubygems-dependency-confusion-attack-side-of-things/
RubyGems dependency confusion attack side of things - Closer to CodeThird Party Advisory
-
https://github.com/rubygems/rubygems/issues/3982
Global vs block gem server source priority doesn't work as expected · Issue #3982 · rubygems/rubygems · GitHubExploit;Issue Tracking;Third Party Advisory
-
https://msrc.microsoft.com/update-guide/en-US/vulnerability/CVE-2021-24105
CVE-2021-24105 - Security Update Guide - Microsoft - Package Managers Configurations Remote Code Execution VulnerabilityPatch;Vendor Advisory
-
https://www.zofrex.com/blog/2021/04/29/bundler-still-vulnerable-dependency-confusion-cve-2020-36327/
Bundler is Still Vulnerable to Dependency Confusion Attacks (CVE-2020-36327) | zofrex.comExploit;Third Party Advisory
Jump to