Vulnerability Details CVE-2017-0903
RubyGems versions between 2.0.0 and 2.6.13 are vulnerable to a possible remote code execution vulnerability. YAML deserialization of gem specifications can bypass class white lists. Specially crafted serialized objects can possibly be used to escalate to remote code execution.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.063
EPSS Ranking 90.7%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 7.5
Products affected by CVE-2017-0903
-
cpe:2.3:a:rubygems:rubygems:2.0.0
-
cpe:2.3:a:rubygems:rubygems:2.0.1
-
cpe:2.3:a:rubygems:rubygems:2.0.10
-
cpe:2.3:a:rubygems:rubygems:2.0.11
-
cpe:2.3:a:rubygems:rubygems:2.0.12
-
cpe:2.3:a:rubygems:rubygems:2.0.13
-
cpe:2.3:a:rubygems:rubygems:2.0.14
-
cpe:2.3:a:rubygems:rubygems:2.0.15
-
cpe:2.3:a:rubygems:rubygems:2.0.16
-
cpe:2.3:a:rubygems:rubygems:2.0.17
-
cpe:2.3:a:rubygems:rubygems:2.0.2
-
cpe:2.3:a:rubygems:rubygems:2.0.3
-
cpe:2.3:a:rubygems:rubygems:2.0.4
-
cpe:2.3:a:rubygems:rubygems:2.0.5
-
cpe:2.3:a:rubygems:rubygems:2.0.6
-
cpe:2.3:a:rubygems:rubygems:2.0.7
-
cpe:2.3:a:rubygems:rubygems:2.0.8
-
cpe:2.3:a:rubygems:rubygems:2.0.9
-
cpe:2.3:a:rubygems:rubygems:2.1.0
-
cpe:2.3:a:rubygems:rubygems:2.1.0.rc.1
-
cpe:2.3:a:rubygems:rubygems:2.1.0.rc.2
-
cpe:2.3:a:rubygems:rubygems:2.1.1
-
cpe:2.3:a:rubygems:rubygems:2.1.10
-
cpe:2.3:a:rubygems:rubygems:2.1.11
-
cpe:2.3:a:rubygems:rubygems:2.1.2
-
cpe:2.3:a:rubygems:rubygems:2.1.3
-
cpe:2.3:a:rubygems:rubygems:2.1.4
-
cpe:2.3:a:rubygems:rubygems:2.1.5
-
cpe:2.3:a:rubygems:rubygems:2.1.6
-
cpe:2.3:a:rubygems:rubygems:2.1.7
-
cpe:2.3:a:rubygems:rubygems:2.1.8
-
cpe:2.3:a:rubygems:rubygems:2.1.9
-
cpe:2.3:a:rubygems:rubygems:2.2.0
-
cpe:2.3:a:rubygems:rubygems:2.2.0.preiew.1
-
cpe:2.3:a:rubygems:rubygems:2.2.0.rc.1
-
cpe:2.3:a:rubygems:rubygems:2.2.1
-
cpe:2.3:a:rubygems:rubygems:2.2.2
-
cpe:2.3:a:rubygems:rubygems:2.2.3
-
cpe:2.3:a:rubygems:rubygems:2.2.4
-
cpe:2.3:a:rubygems:rubygems:2.2.5
-
cpe:2.3:a:rubygems:rubygems:2.3.0
-
cpe:2.3:a:rubygems:rubygems:2.4.0
-
cpe:2.3:a:rubygems:rubygems:2.4.1
-
cpe:2.3:a:rubygems:rubygems:2.4.2
-
cpe:2.3:a:rubygems:rubygems:2.4.3
-
cpe:2.3:a:rubygems:rubygems:2.4.4
-
cpe:2.3:a:rubygems:rubygems:2.4.5
-
cpe:2.3:a:rubygems:rubygems:2.4.6
-
cpe:2.3:a:rubygems:rubygems:2.4.7
-
cpe:2.3:a:rubygems:rubygems:2.4.8
-
cpe:2.3:a:rubygems:rubygems:2.5.0
-
cpe:2.3:a:rubygems:rubygems:2.5.1
-
cpe:2.3:a:rubygems:rubygems:2.5.2
-
cpe:2.3:a:rubygems:rubygems:2.6.0
-
cpe:2.3:a:rubygems:rubygems:2.6.1
-
cpe:2.3:a:rubygems:rubygems:2.6.10
-
cpe:2.3:a:rubygems:rubygems:2.6.11
-
cpe:2.3:a:rubygems:rubygems:2.6.12
-
cpe:2.3:a:rubygems:rubygems:2.6.13
-
cpe:2.3:a:rubygems:rubygems:2.6.2
-
cpe:2.3:a:rubygems:rubygems:2.6.3
-
cpe:2.3:a:rubygems:rubygems:2.6.4
-
cpe:2.3:a:rubygems:rubygems:2.6.5
-
cpe:2.3:a:rubygems:rubygems:2.6.6
-
cpe:2.3:a:rubygems:rubygems:2.6.7
-
cpe:2.3:a:rubygems:rubygems:2.6.8
-
cpe:2.3:a:rubygems:rubygems:2.6.9
-
cpe:2.3:o:canonical:ubuntu_linux:14.04
-
cpe:2.3:o:canonical:ubuntu_linux:16.04
-
cpe:2.3:o:canonical:ubuntu_linux:17.10
-
cpe:2.3:o:debian:debian_linux:8.0
-
cpe:2.3:o:debian:debian_linux:9.0
-
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0
-
cpe:2.3:o:redhat:enterprise_linux_server:7.0
-
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4
-
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6
-
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4
-
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5
-
cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6
-
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4
-
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6
-
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0