Closed
Description
Query PR
github/codeql#12301
github/codeql#13431
Language
Ruby
CVE(s) ID list
- CVE-2022-32224
- CVE-2021-33575 cause by dangerous
Plist.parse_xml
sink
CWE
CWE-502: Deserialization of Untrusted Data
Report
- Deserialization of Untrusted Data from a yaml serialized document
- with user controllable inputs such as yaml strings or yaml files, it is possible to execute code.
- I add some additional sinks and taint tracking steps of paramiko library.
- with Psych >= 4.0.0
Psych.load
is secure by default, so I think the current codeql std lib for ruby should change it to. There are many other sinks that developers can use it in their applications, so I put my time to find all insecure ways/methods that currently are dangerous.
Are you planning to discuss this vulnerability submission publicly? (Blog Post, social networks, etc).
- Yes
- No
Blog post link
A series of Blog posts will be forthcoming soon!