{ "schema_version": "1.4.0", "id": "GHSA-g982-9r8g-6qxw", "modified": "2023-07-05T17:57:47Z", "published": "2018-07-23T19:50:15Z", "aliases": [ "CVE-2014-5003" ], "summary": "Ciborg gem for Ruby allows local users to write files and gain privileges via Symlink", "details": "There is a /tmp file race condition in `chef/travis-cookbooks/ci_environment/perlbrew/recipes/default.rb` in the ciborg gem 3.0.0 when creating `/tmp/perlbrew-installer`. If a malicious local user creates the file first they can overwrite the contents with their own code executing it as the ciborg process owner.\n", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N" } ], "affected": [ { "package": { "ecosystem": "RubyGems", "name": "ciborg" }, "versions": [ "3.0.0" ] } ], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-5003" }, { "type": "ADVISORY", "url": "https://github.com/advisories/GHSA-g982-9r8g-6qxw" }, { "type": "WEB", "url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/ciborg/CVE-2014-5003.yml" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2014/07/07/24" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2014/07/17/5" }, { "type": "WEB", "url": "http://www.vapid.dhs.org/advisories/ciborg-3.0.0.html" } ], "database_specific": { "cwe_ids": [ "CWE-20" ], "severity": "MODERATE", "github_reviewed": true, "github_reviewed_at": "2020-06-16T21:36:44Z", "nvd_published_at": "2018-01-10T18:29:00Z" } }