CVE-2017-10784:
WEBrick RCE Vulnerability
8.8
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.82005%
CWE
Published
5/14/2022
Updated
7/31/2023
KEV Status
No
Technology
Ruby
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
webrick | rubygems | < 1.4.0 | 1.4.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from WEBrick's failure to sanitize terminal escape sequences in Basic Authentication usernames before logging. The key functions are: 1) Log formatting in lib/webrick/log.rb
which lacked escaping, and 2) Authentication handling in basicauth.rb
that passed raw user input to the logger. The GitHub commit 6617c41292
shows escaping was added to Log#format
and exception messages, confirming these were the vulnerable points. Red Hat's advisory explicitly mentions WEBrick log sanitization fixes.