Miggo Logo

CVE-2022-31071: Octopoller gem published with world-writable files

2.5

CVSS Score
3.1

Basic Information

EPSS Score
0.24909%
Published
6/15/2022
Updated
7/10/2023
KEV Status
No
Technology
TechnologyRuby

Technical Details

CVSS Vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
octopollerrubygems= 0.2.00.3.0

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stems from incorrect file permissions (0666 instead of 0644) during the gem packaging process, not from specific functions in the codebase. The root cause was in the build/release automation scripts (script/package and script/release) which lacked proper permission validation. The fix involved adding a new validation script (script/validate) to check file permissions before release. There are no specific application logic functions in the Ruby code that directly caused this vulnerability - it was an infrastructure/process issue in the packaging workflow.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

### Imp**t V*rsion [*.*.*](*ttps://ru*y**ms.or*/**ms/o*topoll*r/v*rsions/*.*.*) o* t** o*topoll*r **m w*s pu*lis*** *ont*inin* worl*-writ***l* *il*s. Sp**i*i**lly, t** **m w*s p**k** wit* *il*s **vin* t**ir p*rmissions s*t to `-rw-rw-rw-` (i.*. ****

Reasoning

T** vuln*r**ility st*ms *rom in*orr**t *il* p*rmissions (**** inst*** o* ****) *urin* t** **m p**k**in* pro**ss, not *rom sp**i*i* *un*tions in t** *o****s*. T** root **us* w*s in t** `*uil*/r*l**s*` *utom*tion s*ripts (`s*ript/p**k***` *n* `s*ript/r