mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 17:21:36 +00:00
29 lines
1.2 KiB
JSON
29 lines
1.2 KiB
JSON
{
|
|
"id": "CVE-2024-27282",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2024-05-14T15:11:57.667",
|
|
"lastModified": "2024-05-14T16:13:02.773",
|
|
"vulnStatus": "Awaiting Analysis",
|
|
"cveTags": [],
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "An issue was discovered in Ruby 3.x through 3.3.0. If attacker-supplied data is provided to the Ruby regex compiler, it is possible to extract arbitrary heap data relative to the start of the text, including pointers and sensitive strings. The fixed versions are 3.0.7, 3.1.5, 3.2.4, and 3.3.1."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Se descubri\u00f3 un problema en Ruby 3.x hasta 3.3.0. Si los datos proporcionados por el atacante se proporcionan al compilador de expresiones regulares de Ruby, es posible extraer datos del mont\u00f3n arbitrarios relacionados con el inicio del texto, incluidos punteros y cadenas confidenciales. Las versiones fijas son 3.0.7, 3.1.5, 3.2.4 y 3.3.1."
|
|
}
|
|
],
|
|
"metrics": {},
|
|
"references": [
|
|
{
|
|
"url": "https://hackerone.com/reports/2122624",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |