[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2006-4111Date: (C)2006-08-14   (M)2023-12-22


Ruby on Rails before 1.1.5 allows remote attackers to execute Ruby code with "severe" or "serious" impact via a File Upload request with an HTTP header that modifies the LOAD_PATH variable, a different vulnerability than CVE-2006-4112.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 7.5
Exploit Score: 10.0
Impact Score: 6.4
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: PARTIAL
Integrity: PARTIAL
Availability: PARTIAL
  
Reference:
SECTRACK-1016673
BID-19454
SECUNIA-21466
SECUNIA-21749
ADV-2006-3237
GLSA-200608-20
SUSE-SR:2006:021
http://blog.koehntopp.de/archives/1367-Ruby-On-Rails-Mandatory-Mystery-Patch.html
http://weblog.rubyonrails.org/2006/8/9/rails-1-1-5-mandatory-security-patch-and-other-tidbits

CPE    11
cpe:/a:rubyonrails:ruby_on_rails:0.8.0
cpe:/a:rubyonrails:ruby_on_rails:0.9.0
cpe:/a:rubyonrails:ruby_on_rails:0.5.5
cpe:/a:rubyonrails:ruby_on_rails:0.5.6
...
CWE    1
CWE-94

© SecPod Technologies