{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"HIGH"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"A vulnerability was discovered in the rubygem-bundler library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747.",
				"category":"general",
				"title":"Synopsis"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-36327"
			},
			{
				"summary":"CVE-2020-36327 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/cve/2020/csaf-openeuler-cve-2020-36327.json"
			},
			{
				"summary":"openEuler-SA-2021-1258",
				"category":"self",
				"url":"https://openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1258"
			},
			{
				"summary":"CVE-2020-36327",
				"category":"self",
				"url":"https://openeuler.org/en/security/cve/detail?cveId=CVE-2020-36327&packageName=rubygem-bundler"
			}
		],
		"title":"openEuler cve CVE-2020-36327",
		"tracking":{
			"initial_release_date":"2021-07-03T09:21:02+08:00",
			"revision_history":[
				{
					"date":"2021-07-03T09:21:02+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				},
				{
					"date":"2024-10-31T09:21:02+08:00",
					"summary":"Current version",
					"number":"2.0.0"
				}
			],
			"generator":{
				"date":"2024-10-31T09:21:02+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2024-10-31T09:21:02+08:00",
			"id":"CVE-2020-36327",
			"version":"2.0.0",
			"status":"interim"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"openEuler-20.03-LTS-SP1",
									"name":"openEuler-20.03-LTS-SP1"
								},
								"name":"openEuler-20.03-LTS-SP1",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"noarch",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"rubygem-bundler-2.2.19-1.oe1.noarch.rpm(20.03-LTS-SP1)",
									"name":"rubygem-bundler-2.2.19-1.oe1.noarch.rpm"
								},
								"name":"rubygem-bundler-2.2.19-1.oe1.noarch.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"rubygem-bundler-help-2.2.19-1.oe1.noarch.rpm(20.03-LTS-SP1)",
									"name":"rubygem-bundler-help-2.2.19-1.oe1.noarch.rpm"
								},
								"name":"rubygem-bundler-help-2.2.19-1.oe1.noarch.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP1"
									},
									"product_id":"rubygem-bundler-2.2.19-1.oe1.src.rpm(20.03-LTS-SP1)",
									"name":"rubygem-bundler-2.2.19-1.oe1.src.rpm"
								},
								"name":"rubygem-bundler-2.2.19-1.oe1.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"rubygem-bundler-2.2.19-1.oe1.noarch.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:rubygem-bundler-2.2.19-1.oe1.noarch",
					"name":"rubygem-bundler-2.2.19-1.oe1.noarch as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"rubygem-bundler-help-2.2.19-1.oe1.noarch.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:rubygem-bundler-help-2.2.19-1.oe1.noarch",
					"name":"rubygem-bundler-help-2.2.19-1.oe1.noarch as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-20.03-LTS-SP1",
				"product_reference":"rubygem-bundler-2.2.19-1.oe1.src.rpm(20.03-LTS-SP1)",
				"full_product_name":{
					"product_id":"openEuler-20.03-LTS-SP1:rubygem-bundler-2.2.19-1.oe1.src",
					"name":"rubygem-bundler-2.2.19-1.oe1.src as a component of openEuler-20.03-LTS-SP1"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2020-36327",
			"notes":[
				{
					"text":"A vulnerability was discovered in the rubygem-bundler library in versions before 5.4, where it is susceptible to arbitrary code execution when it processes untrusted YAML files through the full_load method or with the FullLoader loader. Applications that use the library to process untrusted input may be vulnerable to this flaw. This flaw allows an attacker to execute arbitrary code on the system by abusing the python/object/new constructor. This flaw is due to an incomplete fix for CVE-2020-1747.",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-20.03-LTS-SP1:rubygem-bundler-2.2.19-1.oe1.noarch",
					"openEuler-20.03-LTS-SP1:rubygem-bundler-help-2.2.19-1.oe1.noarch",
					"openEuler-20.03-LTS-SP1:rubygem-bundler-2.2.19-1.oe1.src"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-20.03-LTS-SP1:rubygem-bundler-2.2.19-1.oe1.noarch",
						"openEuler-20.03-LTS-SP1:rubygem-bundler-help-2.2.19-1.oe1.noarch",
						"openEuler-20.03-LTS-SP1:rubygem-bundler-2.2.19-1.oe1.src"
					],
					"details":"rubygem-bundler security update",
					"category":"vendor_fix",
					"url":"https://openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2021-1258"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"HIGH",
						"baseScore":8.8,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-20.03-LTS-SP1:rubygem-bundler-2.2.19-1.oe1.noarch",
						"openEuler-20.03-LTS-SP1:rubygem-bundler-help-2.2.19-1.oe1.noarch",
						"openEuler-20.03-LTS-SP1:rubygem-bundler-2.2.19-1.oe1.src"
					]
				}
			],
			"threats":[
				{
					"details":"High",
					"category":"impact"
				}
			],
			"title":"CVE-2020-36327"
		}
	]
}