Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-27282 PoC — Ruby 安全漏洞

Source
Associated Vulnerability
Title:Ruby 安全漏洞 (CVE-2024-27282)
Description:Ruby是松本行弘个人开发者的一种跨平台、面向对象的动态类型编程语言。 Ruby 3.x版本至3.3.0版本存在安全漏洞,该漏洞源于用户提供的数据提供给 Ruby 正则表达式编译器,则可以提取与文本开头相关的任意堆数据,包括指针和敏感字符串。
Description
script to detect if the installed Ruby version on your system is vulnerable to CVE-2024-27282. You should read the description of the vulnerability for more details: https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/
Readme
# CVE-2024-27282

I created a script to detect if the installed Ruby version on your system is vulnerable to CVE-2024-27282. You should read the description of the vulnerability for more details: https://www.ruby-lang.org/en/news/2024/04/23/arbitrary-memory-address-read-regexp-cve-2024-27282/


File Snapshot

[4.0K] /data/pocs/030c9ce406f292202670969a1784bce77c208110 ├── [1.1K] CVE-2024-27282.rb └── [ 296] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.