An open API service providing security vulnerability metadata for many open source software ecosystems.

MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXZxcXYtdjltMi00OHAy

Critical EPSS: 0.09368% (0.92466 Percentile) EPSS:

Bootstrap-sass contains code execution backdoor

Affected Packages Affected Versions Fixed Versions
rubygems:bootstrap-sass
PURL: pkg:gem/bootstrap-sass
= 3.2.0.3 3.2.0.4
417 Dependent packages
155,544 Dependent repositories
70,869,619 Downloads total

Affected Version Ranges

All affected versions

All unaffected versions

1.2.0, 1.2.1, 1.3.0, 1.3.1, 1.3.2, 1.4.0, 1.4.1, 1.4.2, 1.4.3, 1.4.4, 2.0.0, 2.0.1, 2.0.2, 2.0.3, 3.3.3, 3.3.5, 3.3.6, 3.3.7, 3.4.0, 3.4.1

Arbitrary code execution (via backdoor code) was discovered in bootstrap-sass 3.2.0.3, when downloaded from rubygems.org. An unauthenticated attacker can craft the ___cfduid cookie value with base64 arbitrary code to be executed via eval(), which can be leveraged to execute arbitrary code on the target system. Note that there are three underscore characters in the cookie name. This is unrelated to the __cfduid cookie that is legitimately used by Cloudflare.

References: