[Forgot Password]
Login  Register Subscribe

23631

 
 

115084

 
 

97147

 
 

909

 
 

78730

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2008-1891

Date: (C)2008-04-18   (M)2017-08-08 


Directory traversal vulnerability in WEBrick in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2, when using NTFS or FAT filesystems, allows remote attackers to read arbitrary CGI files via a trailing (1) + (plus), (2) %2b (encoded plus), (3) . (dot), (4) %2e (encoded dot), or (5) %20 (encoded space) character in the URI, possibly related to the WEBrick::HTTPServlet::FileHandler and WEBrick::HTTPServer.new functionality and the :DocumentRoot option.

CVSS Score: 5.0Access Vector: NETWORK
Exploit Score: 10.0Access Complexity: LOW
Impact Score: 2.9Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: NONE
 Availability: NONE





Reference:
SECUNIA-29794
SECUNIA-30831
SECUNIA-31687
ADV-2008-1245
FEDORA-2008-5649
MDVSA-2008:140
MDVSA-2008:141
SUSE-SR:2008:017
http://aluigi.altervista.org/adv/webrickcgi-adv.txt
http://www.ruby-lang.org/en/news/2008/06/20/arbitrary-code-execution-vulnerabilities/
ruby-webrick-cgi-info-disclosure(41824)

CWE    1
CWE-22
OVAL    2
oval:org.secpod.oval:def:301570
oval:org.secpod.oval:def:301246

© 2013 SecPod Technologies