Skip to content
Threat Feed

Tag

Ruby

5 briefs RSS
critical advisory

ERB Deserialization Bypass via def_module/def_method/def_class

A deserialization vulnerability exists in Ruby ERB versions before 4.0.3.1, version 4.0.4, ERB versions 5.0.0 before 6.0.1.1, and ERB versions 6.0.2 before 6.0.4. The `@_init` instance variable guard in `ERB#result` and `ERB#run` can be bypassed via `ERB#def_module`, `ERB#def_method`, and `ERB#def_class`, allowing arbitrary code execution when an ERB object is reconstructed via `Marshal.load` on untrusted data.

ERB deserialization rce ruby rails
2r 2t 1c
high advisory

bsv-sdk and bsv-wallet Credential Forgery Vulnerability

The bsv-sdk and bsv-wallet packages are vulnerable to credential forgery because the `acquire_certificate` function persists certificate records to storage without verifying the certifier's signature, allowing attackers to forge identity certificates.

credential-forgery ruby bsv-sdk bsv-wallet
2r 1t
high advisory

BSV Ruby SDK Improper ARC Response Handling

BSV Ruby SDK versions before 0.8.2 improperly handle ARC responses, treating certain failure statuses as successful broadcasts, potentially tricking applications into trusting unaccepted transactions; version 0.8.2 resolves this vulnerability.

bsv ruby blockchain vulnerability
2r 1t 1c
medium advisory

Rack::Static Information Disclosure Vulnerability (CVE-2026-34785)

Rack versions prior to 2.2.23, 3.1.21, and 3.2.6 are vulnerable to information disclosure due to improper static file serving via a prefix matching issue in Rack::Static.

rack information-disclosure CVE-2026-34785 ruby webserver
2r 1t 1c
high advisory

Avo Framework Broken Access Control Vulnerability

Avo framework version 3.x contains a critical Broken Access Control vulnerability in the ActionsController. Due to insecure action lookup logic, an authenticated user can execute any Action class on any resource, even if the action is not registered for that specific resource. This leads to Privilege Escalation and unauthorized data manipulation across the entire application. Version 3.31.2 remediates this issue.

avo broken-access-control privilege-escalation ruby
2r 1t