Skip to content

Commit e4d63d4

Browse files
jasnowpostmodern
authored andcommitted
2 brand new advisories
1 parent ac90497 commit e4d63d4

File tree

2 files changed

+79
-0
lines changed

2 files changed

+79
-0
lines changed
Lines changed: 45 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,45 @@
1+
---
2+
gem: alchemy_cms
3+
cve: 2026-23885
4+
ghsa: 2762-657x-v979
5+
url: https://github.com/AlchemyCMS/alchemy_cms/security/advisories/GHSA-2762-657x-v979
6+
title: AlchemyCMS - Authenticated Remote Code Execution (RCE) via
7+
eval injection in ResourcesHelper
8+
date: 2026-01-21
9+
description: |
10+
### Summary
11+
12+
A vulnerability was discovered during a manual security audit
13+
of the AlchemyCMS source code. The application uses the Ruby
14+
`eval()` function to dynamically execute a string provided by the
15+
`resource_handler.engine_name` attribute in
16+
`Alchemy::ResourcesHelper#resource_url_proxy`.
17+
18+
### Details
19+
20+
The vulnerability exists in `app/helpers/alchemy/resources_helper.rb`
21+
at line 28. The code explicitly bypasses security linting with
22+
`# rubocop:disable Security/Eval`, indicating that the use of a
23+
dangerous function was known but not properly mitigated.
24+
25+
Since `engine_name` is sourced from module definitions that can be
26+
influenced by administrative configurations, it allows an authenticated
27+
attacker to escape the Ruby sandbox and execute arbitrary system
28+
commands on the host OS.
29+
30+
But, for this attack to be possible local file access to the alchemy
31+
project or the source on a remote server is necessary in order to
32+
manipulate the module config file, though.
33+
cvss_v3: 6.6
34+
patched_versions:
35+
- "~> 7.4.12"
36+
- ">= 8.0.3"
37+
related:
38+
url:
39+
- https://nvd.nist.gov/vuln/detail/CVE-2026-23885
40+
- https://github.com/AlchemyCMS/alchemy_cms/security/advisories/GHSA-2762-657x-v979
41+
- https://github.com/AlchemyCMS/alchemy_cms/commit/55d03ec600fd9e07faae1138b923790028917d26
42+
- https://github.com/AlchemyCMS/alchemy_cms/commit/563c4ce45bf5813b7823bf3403ca1fc32cb769e7
43+
- https://github.com/AlchemyCMS/alchemy_cms/releases/tag/v7.4.12
44+
- https://github.com/AlchemyCMS/alchemy_cms/releases/tag/v8.0.3
45+
- https://github.com/advisories/GHSA-2762-657x-v979

rubies/mruby/CVE-2021-46020.yml

Lines changed: 34 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,34 @@
1+
---
2+
engine: mruby
3+
cve: 2021-46020
4+
ghsa: f639-3h6h-vr46
5+
url: https://github.com/advisories/GHSA-f639-3h6h-vr46
6+
title: An untrusted pointer dereference in mrb_vm_exec() of mruby 3.0.0
7+
date: 2022-01-14
8+
description: |
9+
An untrusted pointer dereference in mrb_vm_exec() of mruby v3.0.0
10+
can lead to a segmentation fault or application crash.
11+
12+
## PATCH INFO
13+
14+
- Mruby #5613 described the issue and Matz cited #5619 and #5620
15+
as "been addressed" on 2/16/2022.
16+
- Found the #5619 commit on 12/31/2021 in 3.1.0-rc release.
17+
- Found the #5620 commit on 1/02/2022 in 3.1.0-rc release.
18+
- 3.1.0-rc was released on 1/17/2022.
19+
cvss_v2: 5.0
20+
cvss_v3: 7.3
21+
patched_versions:
22+
- ">= 3.1.0-rc"
23+
related:
24+
url:
25+
- https://github.com/advisories/GHSA-f639-3h6h-vr46
26+
- https://nvd.nist.gov/vuln/detail/CVE-2021-46020
27+
- https://mruby.org/releases/2022/03/12/mruby-3.1.0-released.html
28+
- https://github.com/mruby/mruby/blob/master/doc/mruby3.1.md
29+
- https://github.com/mruby/mruby/issues/5613
30+
- https://github.com/mruby/mruby/pull/5619
31+
- https://github.com/mruby/mruby/pull/5619/commits/a137ef12f981b517f1e6b64e39edc7ac15d7e1eb
32+
- https://github.com/mruby/mruby/pull/5620
33+
- https://github.com/mruby/mruby/pull/5620/commits/d3b7601af96c9e0eeba4c89359289661c755a74a
34+
- https://github.com/mruby/mruby/commit/7f40b645d2773c8f50c48ae4adf90488e164da55

0 commit comments

Comments
 (0)