CVE-2019-13354: strong_password Ruby gem malicious version causing Remote Code Execution vulnerability
9.8
CVSS Score
3.0
Basic Information
CVE ID
GHSA ID
EPSS Score
0.71714%
CWE
Published
7/8/2019
Updated
11/4/2023
KEV Status
No
Technology
Ruby
Technical Details
CVSS Vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
strong_password | rubygems | = 0.0.7 | 0.0.8 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from malicious code added in version 0.0.7. The _!
method is explicitly defined to execute code blocks while suppressing exceptions. It is immediately invoked to start a background thread that fetches and evaluates remote code (via eval(Net::HTTP.get(...)))
, enabling RCE. This matches CWE-94 (Code Injection) and aligns with third-party analyses confirming the backdoor's behavior. The code was removed in version 0.0.8, confirming its malicious role.