8.8
HIGH
CVE-2017-17405
Apache Ruby Net Command Injection Vulnerability
Description

Ruby before 2.4.3 allows Net::FTP command injection. Net::FTP#get, getbinaryfile, gettextfile, put, putbinaryfile, and puttextfile use Kernel#open to open a local file. If the localfile argument starts with the "|" pipe character, the command following the pipe character is executed. The default value of localfile is File.basename(remotefile), so malicious FTP servers could cause arbitrary command execution.

INFO

Published Date :

Dec. 15, 2017, 9:29 a.m.

Last Modified :

Sept. 19, 2019, 10:15 a.m.

Remotely Exploitable :

Yes !

Impact Score :

5.9

Exploitability Score :

2.8
Public PoC/Exploit Available at Github

CVE-2017-17405 has a 18 public PoC/Exploit available at Github. Go to the Public Exploits tab to see the list.

Affected Products

The following products are affected by CVE-2017-17405 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Redhat enterprise_linux_desktop
2 Redhat enterprise_linux_server
3 Redhat enterprise_linux_workstation
4 Redhat enterprise_linux_server_aus
5 Redhat enterprise_linux_server_eus
6 Redhat enterprise_linux_server_tus
1 Ruby-lang ruby
1 Debian debian_linux
References to Advisories, Solutions, and Tools

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

None

Updated: 5 days, 19 hours ago
0 stars 2 fork 2 watcher
Born at : Nov. 17, 2024, 11:53 a.m. This repo has been linked 414 different CVEs too.

Web CTF CheatSheet 🐈

Updated: 1 week, 4 days ago
0 stars 0 fork 0 watcher
Born at : Nov. 11, 2024, 8:48 p.m. This repo has been linked 23 different CVEs too.

这是一个每天同步Vulnerability-Wiki中docs-base中内容的项目

HTML

Updated: 2 months ago
0 stars 0 fork 0 watcher
Born at : Sept. 20, 2024, 3:27 a.m. This repo has been linked 203 different CVEs too.

None

Updated: 9 months, 3 weeks ago
0 stars 0 fork 0 watcher
Born at : Jan. 26, 2024, 10:07 a.m. This repo has been linked 161 different CVEs too.

None

Updated: 1 year, 1 month ago
0 stars 0 fork 0 watcher
Born at : Oct. 12, 2023, 10:59 a.m. This repo has been linked 2 different CVEs too.

春秋云境靶场解题攻略

Updated: 2 months, 2 weeks ago
7 stars 0 fork 0 watcher
Born at : July 28, 2023, 8:14 a.m. This repo has been linked 125 different CVEs too.

None

Updated: 1 year, 10 months ago
0 stars 0 fork 0 watcher
Born at : Jan. 11, 2023, 1:21 p.m. This repo has been linked 1042 different CVEs too.

None

Python

Updated: 2 months, 2 weeks ago
7 stars 0 fork 0 watcher
Born at : Dec. 5, 2022, 2:29 a.m. This repo has been linked 26 different CVEs too.

一个Vulhub漏洞复现知识库

vulnerability exploit

Updated: 2 months, 2 weeks ago
448 stars 87 fork 87 watcher
Born at : March 3, 2022, 8:38 a.m. This repo has been linked 171 different CVEs too.

一个漏洞POC知识库 目前数量 1000+

poc

Updated: 2 months, 2 weeks ago
3417 stars 682 fork 682 watcher
Born at : Feb. 20, 2022, 6:43 a.m. This repo has been linked 405 different CVEs too.

安全类各家文库大乱斗

HTML CSS JavaScript Go Python Shell C

Updated: 2 months, 2 weeks ago
856 stars 214 fork 214 watcher
Born at : Feb. 15, 2022, 3:14 a.m. This repo has been linked 568 different CVEs too.

Web CTF CheatSheet 🐈

ctf cheatsheet capture-the-flag

PHP Classic ASP ASP.NET Python Ruby Batchfile PowerShell VBScript

Updated: 4 months, 1 week ago
21 stars 5 fork 5 watcher
Born at : July 17, 2021, 6:30 a.m. This repo has been linked 23 different CVEs too.

None

Updated: 3 months, 1 week ago
13 stars 4 fork 4 watcher
Born at : May 25, 2020, 7:51 a.m. This repo has been linked 1027 different CVEs too.

Some good-boy scripts I've made throughout my time learning aggressive infosec

Python Ruby PHP HTML Shell

Updated: 3 months, 1 week ago
8 stars 1 fork 1 watcher
Born at : April 12, 2020, 4:11 a.m. This repo has been linked 3 different CVEs too.

None

PHP ASP Python Ruby Batchfile PowerShell VBScript

Updated: 11 months, 1 week ago
3 stars 1 fork 1 watcher
Born at : Jan. 24, 2020, 2:45 a.m. This repo has been linked 9 different CVEs too.

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2017-17405 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2017-17405 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Sep. 19, 2019

    Action Type Old Value New Value
    Added Reference https://access.redhat.com/errata/RHSA-2019:2806 [No Types Assigned]
  • Modified Analysis by [email protected]

    Mar. 14, 2019

    Action Type Old Value New Value
    Changed Reference Type https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html No Types Assigned https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html Mailing List, Third Party Advisory
    Changed Reference Type https://www.debian.org/security/2018/dsa-4259 No Types Assigned https://www.debian.org/security/2018/dsa-4259 Third Party Advisory
    Changed Reference Type https://lists.debian.org/debian-lts-announce/2017/12/msg00024.html No Types Assigned https://lists.debian.org/debian-lts-announce/2017/12/msg00024.html Mailing List, Third Party Advisory
    Changed Reference Type http://www.securitytracker.com/id/1042004 No Types Assigned http://www.securitytracker.com/id/1042004 Third Party Advisory, VDB Entry
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:0585 No Types Assigned https://access.redhat.com/errata/RHSA-2018:0585 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:0584 No Types Assigned https://access.redhat.com/errata/RHSA-2018:0584 Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:0378 No Types Assigned https://access.redhat.com/errata/RHSA-2018:0378 Third Party Advisory
    Changed Reference Type https://lists.debian.org/debian-lts-announce/2017/12/msg00025.html No Types Assigned https://lists.debian.org/debian-lts-announce/2017/12/msg00025.html Mailing List, Third Party Advisory
    Changed Reference Type https://access.redhat.com/errata/RHSA-2018:0583 No Types Assigned https://access.redhat.com/errata/RHSA-2018:0583 Third Party Advisory
    Added CPE Configuration OR *cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* *cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* *cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:* *cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
  • CVE Modified by [email protected]

    Oct. 31, 2018

    Action Type Old Value New Value
    Added Reference http://www.securitytracker.com/id/1042004 [No Types Assigned]
  • CVE Modified by [email protected]

    Aug. 03, 2018

    Action Type Old Value New Value
    Added Reference https://www.debian.org/security/2018/dsa-4259 [No Types Assigned]
  • CVE Modified by [email protected]

    Jul. 15, 2018

    Action Type Old Value New Value
    Added Reference https://lists.debian.org/debian-lts-announce/2018/07/msg00012.html [No Types Assigned]
  • CVE Modified by [email protected]

    Mar. 28, 2018

    Action Type Old Value New Value
    Added Reference https://access.redhat.com/errata/RHSA-2018:0585 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:0584 [No Types Assigned]
    Added Reference https://access.redhat.com/errata/RHSA-2018:0583 [No Types Assigned]
  • CVE Modified by [email protected]

    Mar. 02, 2018

    Action Type Old Value New Value
    Added Reference https://access.redhat.com/errata/RHSA-2018:0378 [No Types Assigned]
  • CVE Modified by [email protected]

    Feb. 04, 2018

    Action Type Old Value New Value
    Added Reference https://lists.debian.org/debian-lts-announce/2017/12/msg00025.html [No Types Assigned]
    Added Reference https://lists.debian.org/debian-lts-announce/2017/12/msg00024.html [No Types Assigned]
  • Initial Analysis by [email protected]

    Dec. 29, 2017

    Action Type Old Value New Value
    Added CVSS V2 (AV:N/AC:M/Au:N/C:C/I:C/A:C)
    Added CVSS V3 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
    Changed Reference Type https://www.ruby-lang.org/en/news/2017/12/14/net-ftp-command-injection-cve-2017-17405/ No Types Assigned https://www.ruby-lang.org/en/news/2017/12/14/net-ftp-command-injection-cve-2017-17405/ Vendor Advisory
    Changed Reference Type https://www.ruby-lang.org/en/news/2017/12/14/ruby-2-4-3-released/ No Types Assigned https://www.ruby-lang.org/en/news/2017/12/14/ruby-2-4-3-released/ Patch, Release Notes, Vendor Advisory
    Changed Reference Type https://www.exploit-db.com/exploits/43381/ No Types Assigned https://www.exploit-db.com/exploits/43381/ Exploit, Third Party Advisory, VDB Entry
    Changed Reference Type http://www.securityfocus.com/bid/102204 No Types Assigned http://www.securityfocus.com/bid/102204 Third Party Advisory, VDB Entry
    Added CWE CWE-78
    Added CPE Configuration OR *cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:* versions from (including) 2.2 up to (including) 2.2.8 *cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:* versions from (including) 2.3 up to (including) 2.3.5 *cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:* versions from (including) 2.4 up to (including) 2.4.2 *cpe:2.3:a:ruby-lang:ruby:2.5.0:preview1:*:*:*:*:*:*
  • CVE Modified by [email protected]

    Dec. 27, 2017

    Action Type Old Value New Value
    Added Reference https://www.exploit-db.com/exploits/43381/ [No Types Assigned]
  • CVE Modified by [email protected]

    Dec. 20, 2017

    Action Type Old Value New Value
    Added Reference http://www.securityfocus.com/bid/102204 [No Types Assigned]
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2017-17405 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

89.50 }} -0.41%

score

0.98642

percentile

CVSS30 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability