Advisory Database
  • Advisories
  • Dependency Scanning
  1. gem
  2. ›
  3. tzinfo
  4. ›
  5. CVE-2022-31163

CVE-2022-31163: Relative Path Traversal

July 22, 2022 (updated October 26, 2022)

TZInfo is a Ruby library that provides access to time zone data and allows times to be converted using time zone rules. Versions prior to 0.36.1, as well as those prior to 1.2.10 when used with the Ruby data source tzinfo-data, is vulnerable to relative path traversal. With the Ruby data source, time zones are defined in Ruby files. There is one file per time zone. Time zone files are loaded with require on demand. In the affected versions, TZInfo::Timezone.get fails to validate time zone identifiers correctly, allowing a new line character within the identifier. With Ruby version 1.9.3 and later, TZInfo::Timezone.get can be made to load unintended files with require, executing them within the Ruby process. Versions 0.3.61 and 1.2.10 include fixes to correctly validate time zone identifiers. Versions 2.0.0 and later are not vulnerable. Version 0.3.61 can still load arbitrary files from the Ruby load path if their name follows the rules for a valid time zone identifier and the file has a prefix of tzinfo/definition within a directory in the load path. Applications should ensure that untrusted files are not placed in a directory on the load path. As a workaround, the time zone identifier can be validated before passing to TZInfo::Timezone.get by ensuring it matches the regular expression \A[A-Za-z0-9+\-_]+(?:\/[A-Za-z0-9+\-_]+)*\z.

References

  • github.com/advisories/GHSA-5cm2-9h8c-rvfx
  • github.com/rubysec/ruby-advisory-db/blob/master/gems/tzinfo/CVE-2022-31163.yml
  • github.com/tzinfo/tzinfo/commit/ca29f349856d62cb2b2edb3257d9ddd2f97b3c27
  • github.com/tzinfo/tzinfo/releases/tag/v0.3.61
  • github.com/tzinfo/tzinfo/releases/tag/v1.2.10
  • github.com/tzinfo/tzinfo/security/advisories/GHSA-5cm2-9h8c-rvfx
  • nvd.nist.gov/vuln/detail/CVE-2022-31163

Code Behaviors & Features

Detect and mitigate CVE-2022-31163 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 0.3.61, all versions starting from 1.0.0 before 1.2.10

Fixed versions

  • 0.3.61
  • 1.2.10

Solution

Upgrade to versions 0.3.61, 1.2.10 or above.

Impact 8.1 HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Source file

gem/tzinfo/CVE-2022-31163.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:10 +0000.