[Japanese]

JVNDB-2012-000031

ActiveScriptRuby vulnerable to arbitrary Ruby script execution

Overview

ActiveScriptRuby contains a vulnerability where an arbitrary Ruby script may be executed on a web browser that can execute ActiveX controls when HTML is displayed.

ActiveScriptRuby is a software to implement Ruby into a Windows environment. ActiveScriptRuby contains a vulnerability where an arbitrary Ruby script may be executed on the web browser that can execute ActiveX controls when HTML is displayed.

Moca reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

Base Metrics: 5.8 (Medium) [IPA Score]
  • Access Vector: Network
  • Access Complexity: Medium
  • Authentication: None
  • Confidentiality Impact: Partial
  • Integrity Impact: None
  • Availability Impact: Partial

Affected Products


COM Meets Ruby
  • ActiveScriptRuby

ActiveScriptRuby with GRScript18.dll versions prior to 1.2.2.0 are affected.
Impact

A remote attacker may be able to obtain information on the system or cause a denial-of-service (DoS).
Solution

[Update the software]
Update to the latest version according to the information provided by the developer.

[Apply a workaround]
The following workaround may mitigate the affects of this vulnerability.

* Un-register the COM server by executing the command below
regsvr32 /u ASR-1.8install directory\bin\GRScript18.dll
Vendor Information

COM Meets Ruby
CWE (What is CWE?)

  1. No Mapping(CWE-Other) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2012-1241
References

  1. JVN : JVN#33283707
  2. National Vulnerability Database (NVD) : CVE-2012-1241
Revision History

[2012/04/13]
  Web page was published