CVE-2018-3779: active-support impersonates 'activesupport' gem
10
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.9213%
CWE
Published
8/13/2018
Updated
1/18/2023
KEV Status
No
Technology
Ruby
Technical Details
CVSS Vector
AV:N/AC:L/Au:N/C:C/I:C/A:C
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
active-support | rubygems | > 0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from a malicious compiled extension
in the 'active-support' gem, not from identifiable Ruby functions
. The attack vector involves native code that decodes a base64 domain, downloads payloads, and executes them. Since the advisory provides no source code or disassembly of the compiled extension
, and RubyGems' vulnerability reporting doesn't list specific vulnerable functions
, we cannot confidently name any Ruby-level functions
. The CWE-77 command injection occurs at the native code level, which isn't exposed through standard Ruby function
signatures.