### [CVE-2019-3881](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3881) ![](https://img.shields.io/static/v1?label=Product&message=rubygem-bundler&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-427&color=brighgreen) ### Description Bundler prior to 2.1.0 uses a predictable path in /tmp/, created with insecure permissions as a storage location for gems, if locations under the user's home directory are not available. If Bundler is used in a scenario where the user does not have a writable home directory, an attacker could place malicious code in this directory that would be later loaded and executed. ### POC #### Reference No PoCs from references. #### Github - https://github.com/404notf0und/CVE-Flow - https://github.com/mbklein/dot-properties