[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

252212

 
 

909

 
 

196748

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Filter bypass vulnerability in Ruby on Rails versions 3.0.x before 3.0.4

ID: oval:org.secpod.oval:def:292Date: (C)2011-03-07   (M)2022-10-10
Class: VULNERABILITYFamily: windows




The host is installed with Ruby on Rails versions 3.0.x before 3.0.4 and is prone to filter bypass vulnerability. A flaw is present in the application, which fails to handle the filtering operation in the case insensitive file systems. Successful exploitation allow remote attackers to bypass intended access restrictions via an action name that uses an unintended case for alphabetic characters.

Platform:
Microsoft Windows 2000
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Vista
Microsoft Windows XP
Product:
Ruby on Rails
Reference:
CVE-2011-0449
CVE    1
CVE-2011-0449
CPE    1
cpe:/a:ruby_on_rails:ruby_on_rails

© SecPod Technologies