CVE-2022-31071: Octopoller gem published with world-writable files
2.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.24909%
CWE
Published
6/15/2022
Updated
7/10/2023
KEV Status
No
Technology
Ruby
Technical Details
CVSS Vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| octopoller | rubygems | = 0.2.0 | 0.3.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from incorrect file permissions (0666 instead of 0644) during the gem packaging process, not from specific functions in the codebase. The root cause was in the build/release automation scripts (script/package and script/release) which lacked proper permission validation. The fix involved adding a new validation script (script/validate) to check file permissions before release. There are no specific application logic functions in the Ruby code that directly caused this vulnerability - it was an infrastructure/process issue in the packaging workflow.