Home / CVE DB / CVE-2024-27281
Standard
Vulnerability Identifier

CVE-2024-27281

2024-05-14
Severity Assessment
4.5
MEDIUM
CVSS v3.x Score
Clinical Analysis (Description)

An issue was discovered in RDoc 6.3.3 through 6.6.2, as distributed in Ruby 3.x through 3.3.0. When parsing .rdoc_options (used for configuration in RDoc) as a YAML file, object injection and resultant remote code execution are possible because there are no restrictions on the classes that can be restored. (When loading the documentation cache, object injection and resultant remote code execution are also possible if there were a crafted cache.) The main fixed version is 6.6.3.1. For Ruby 3.0 users, a fixed version is rdoc 6.3.4.1. For Ruby 3.1 users, a fixed version is rdoc 6.4.1.1. For Ruby 3.2 users, a fixed version is rdoc 6.5.1.1.

Vector Sequencing

Attack Parameters

Attack Vector
Local
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Impact Consequences

Technical Impact

Unchanged
Scope
Low
Confidentiality
Low
Integrity
Low
Availability
AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
Weakness Classification

CWE-CWE-502

Timeline

Time Line

PUBLICATION
14 May 2024
MODIFICATION
04 Nov 2025
FIRST PATCH
11 Oct 2025
Impact Statistics

Key Metrics

CVSS Score
4.5
MEDIUM
Patches
3
Available
Remediation Protocol

Recommended Solution

No automatic solution found. Check vendor references.
Recommended Actions for Administrators

Immediate Action Plan

1. Inventory

Identify all affected systems in your infrastructure.

2. Assessment

Assess exposure and criticality for your organization.

3. Mitigation

Apply patches or available workarounds.

4. Verification

Test and confirm effectiveness of applied measures.