Description
Bundler prior to 2.1.0 uses a predictable path in /tmp/, created with insecure permissions as a storage location for gems, if locations under the user's home directory are not available. If Bundler is used in a scenario where the user does not have a writable home directory, an attacker could place malicious code in this directory that would be later loaded and executed.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-1077 | Bundler prior to 2.1.0 uses a predictable path in /tmp/, created with insecure permissions as a storage location for gems, if locations under the user's home directory are not available. If Bundler is used in a scenario where the user does not have a writable home directory, an attacker could place malicious code in this directory that would be later loaded and executed. |
Github GHSA |
GHSA-g98m-96g9-wfjq | Insecure path handling in Bundler |
Ubuntu USN |
USN-4870-1 | Bundler vulnerability |
References
History
Sun, 13 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-04T19:19:18.600Z
Reserved: 2019-01-03T00:00:00.000Z
Link: CVE-2019-3881
No data.
Status : Modified
Published: 2020-09-04T12:15:10.387
Modified: 2024-11-21T04:42:47.230
Link: CVE-2019-3881
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA
Ubuntu USN