YAML Object Injection and Remote Code Execution in RDoc by Ruby
CVE-2024-27281
4.5MEDIUM
What is CVE-2024-27281?
An issue exists in RDoc versions 6.3.3 through 6.6.2, which is included in Ruby versions 3.x up to 3.3.0. The vulnerability arises when .rdoc_options files are parsed as YAML without restrictions, leading to potential object injection. This lack of validation can enable attackers to execute remote code, particularly during the loading of the documentation cache, which may contain crafted content. The issue is addressed in RDoc version 6.6.3.1, with specific fixes for Ruby 3.0 (version 6.3.4.1), Ruby 3.1 (version 6.4.1.1), and Ruby 3.2 (version 6.5.1.1). It is crucial for users to update to the fixed versions to mitigate this security risk.
