{"id":"CVE-2019-16255","details":"Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows code injection if the first argument (aka the \"command\" argument) to Shell#[] or Shell#test in lib/shell.rb is untrusted data. An attacker can exploit this to call an arbitrary Ruby method.","modified":"2026-04-16T00:03:59.499701307Z","published":"2019-11-26T18:15:15.303Z","related":["ALSA-2021:2587","ALSA-2021:2588","SUSE-SU-2020:0737-1","SUSE-SU-2020:1570-1","openSUSE-SU-2020:0395-1"],"database_specific":{"unresolved_ranges":[{"source":"CPE_FIELD","cpe":"cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"8.0"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"9.0"}]},{"source":"CPE_FIELD","cpe":"cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*","extracted_events":[{"last_affected":"15.1"}]}]},"references":[{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2023/04/msg00033.html"},{"type":"ADVISORY","url":"http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00041.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/11/msg00025.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/12/msg00009.html"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2020/08/msg00027.html"},{"type":"ADVISORY","url":"https://seclists.org/bugtraq/2019/Dec/31"},{"type":"ADVISORY","url":"https://seclists.org/bugtraq/2019/Dec/32"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/202003-06"},{"type":"ADVISORY","url":"https://www.debian.org/security/2019/dsa-4587"},{"type":"ADVISORY","url":"https://www.ruby-lang.org/ja/news/2019/10/01/code-injection-shell-test-cve-2019-16255/"},{"type":"ADVISORY","url":"https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-4-8-released/"},{"type":"ADVISORY","url":"https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-5-7-released/"},{"type":"ADVISORY","url":"https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-6-5-released/"},{"type":"FIX","url":"https://hackerone.com/reports/327512"},{"type":"FIX","url":"https://www.oracle.com/security-alerts/cpujan2020.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/graalvm/graalvm-ce-builds","events":[{"introduced":"0"},{"last_affected":"e57b8d283fb4de49639b22adcb9aad31baaa6352"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"19.3.0.2"}],"cpe":"cpe:2.3:a:oracle:graalvm:19.3.0.2:*:*:*:enterprise:*:*:*","source":"CPE_FIELD"}}],"versions":["vm-19.3.0","vm-19.3.0.2"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-16255.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/ruby/ruby","events":[{"introduced":"d4bb726b713658f56e630b6cf817a0155b6f390e"},{"last_affected":"c91478058505cd8cae5160c1056bcde65af5a78b"},{"introduced":"4e0a512972cdcbfcd5279f1a2a81ba342ed75b6e"},{"last_affected":"189a36cfabfc30e785cece0692c802be87ebd9cf"},{"introduced":"c1af7b1e1d408f9796a5f46c9ed36bc5adea4aa2"},{"last_affected":"6315e42c222d5484004494950c7524a85acadb20"}],"database_specific":{"extracted_events":[{"introduced":"2.4.0"},{"last_affected":"2.4.7"},{"introduced":"2.5.0"},{"last_affected":"2.5.6"},{"introduced":"2.6.0"},{"last_affected":"2.6.4"}],"cpe":"cpe:2.3:a:ruby-lang:ruby:*:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2019-16255.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}