cve/2024/CVE-2024-27282.md

20 lines
844 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2024-27282](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-27282)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings. The fixed versions are 3.0.7, 3.1.5, 3.2.4, and 3.3.1.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/lifeparticle/Ruby-Cheatsheet
2024-06-22 09:37:59 +00:00
- https://github.com/nomi-sec/PoC-in-GitHub
2025-09-29 16:08:36 +00:00
- https://github.com/p333zy/poc-ruby-infoleak
2024-05-25 21:48:12 +02:00