Miggo Logo

CVE-2019-18409: Ruby_parser-legacy Incorrect Permission Assignment for Critical Resource

7.8

CVSS Score
3.1

Basic Information

EPSS Score
0.30434%
Published
10/25/2019
Updated
8/25/2023
KEV Status
No
Technology
TechnologyRuby

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Package NameEcosystemVulnerable VersionsFirst Patched Version
ruby_parser-legacyrubygems<= 1.0.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from incorrect file permissions (world-writable files) in the ruby_parser-legacy gem, not from specific function implementations. The advisory explicitly identifies file paths like 'lib/ruby_parser/legacy/ruby_parser.rb' as being vulnerable to modification, but does not point to any specific functions within those files as being inherently flawed. The core issue is the installation-time file permissions (CWE-732), not a coding error in a particular function. No functions are identified as vulnerable with high confidence because the exploitability comes from filesystem permissions rather than function logic.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** ru*y_p*rs*r-l****y (*k* l****y) **m *.*.* *or Ru*y *llows lo**l privil*** *s**l*tion ****us* o* worl*-writ**l* *il*s. *or *x*mpl*, i* t** *r*k*m*n **m (w*i** **s * l****y **p*n**n*y) *.*.* t*rou** *.*.* is us**, * lo**l us*r **n ins*rt m*li*ious

Reasoning

T** vuln*r**ility st*ms *rom in*orr**t *il* p*rmissions (worl*-writ**l* *il*s) in t** ru*y_p*rs*r-l****y **m, not *rom sp**i*i* *un*tion impl*m*nt*tions. T** **visory *xpli*itly i**nti*i*s *il* p*t*s lik* 'li*/ru*y_p*rs*r/l****y/ru*y_p*rs*r.r*' *s **