9.8
CVSSv3

CVE-2019-10842

Published: 04/04/2019 Updated: 11/04/2019
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Arbitrary code execution (via backdoor code) exists in bootstrap-sass 3.2.0.3, when downloaded from rubygems.org. An unauthenticated attacker can craft the ___cfduid cookie value with base64 arbitrary code to be executed via eval(), which can be leveraged to execute arbitrary code on the target system. Note that there are three underscore characters in the cookie name. This is unrelated to the __cfduid cookie that is legitimately used by Cloudflare.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

getbootstrap bootstrap-sass 3.2.0.3

Vendor Advisories

Impact: Important Public Date: 2019-03-27 CWE: CWE-94 Bugzilla: 1697482: CVE-2019-10842 rubygem-bootstr ...

Github Repositories

Simple HTTP API for quering cvelist data

Simple CVE API Provides a simple HTTP API built with FastAPI to query cvelist data Getting Started This code will build an SQLite database using cvelist, and then provide a FastAPI endpoint that can be used for querying Building This should be as straight forward as building and running the container: # building docker image build -t simple_cve_api:latest # running docker