[Forgot Password]
Login  Register Subscribe

23631

 
 

115083

 
 

97389

 
 

909

 
 

78730

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2008-1145

Date: (C)2008-03-04   (M)2017-10-04
 
CVSS Score: 5.0Access Vector: NETWORK
Exploitability Subscore: 10.0Access Complexity: LOW
Impact Subscore: 2.9Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: NONE
 Availability: NONE











Directory traversal vulnerability in WEBrick in Ruby 1.8 before 1.8.5-p115 and 1.8.6-p114, and 1.9 through 1.9.0-1, when running on systems that support backslash (\) path separators or case-insensitive file names, allows remote attackers to access arbitrary files via (1) "..%5c" (encoded backslash) sequences or (2) filenames that match patterns in the :NondisclosureName option.

Reference:
SECTRACK-1019562
http://www.securityfocus.com/archive/1/archive/1/489218/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/489205/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/490056/100/0/threaded
BID-28123
SECUNIA-29232
SECUNIA-29357
SECUNIA-29536
SECUNIA-30802
SECUNIA-31687
SECUNIA-32371
EXPLOIT-DB-5215
ADV-2008-0787
ADV-2008-1981
APPLE-SA-2008-06-30
FEDORA-2008-2443
FEDORA-2008-2458
MDVSA-2008:141
MDVSA-2008:142
RHSA-2008:0897
SUSE-SR:2008:017
VU#404515
http://support.apple.com/kb/HT2163
http://wiki.rpath.com/Advisories:rPSA-2008-0123
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0123
http://www.ruby-lang.org/en/news/2008/03/03/webrick-file-access-vulnerability/
https://issues.rpath.com/browse/RPL-2338
ruby-webrick-directory-traversal(41010)

CWE    1
CWE-22
OVAL    1
oval:org.secpod.oval:def:301570

© 2013 SecPod Technologies