Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2008-1145

Опубликовано: 04 мар. 2008
Источник: debian
EPSS Высокий

Описание

Directory traversal vulnerability in WEBrick in Ruby 1.8 before 1.8.5-p115 and 1.8.6-p114, and 1.9 through 1.9.0-1, when running on systems that support backslash (\) path separators or case-insensitive file names, allows remote attackers to access arbitrary files via (1) "..%5c" (encoded backslash) sequences or (2) filenames that match patterns in the :NondisclosureName option.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ruby1.8fixed1.8.6.114-1package
ruby1.9fixed1.9.0.1-1package
ruby1.8no-dsasargepackage
ruby1.8no-dsaetchpackage
ruby1.9no-dsaetchpackage

Примечания

  • http://www.ruby-lang.org/en/news/2008/03/03/webrick-file-access-vulnerability/

EPSS

Процентиль: 99%
0.76719
Высокий

Связанные уязвимости

ubuntu
больше 17 лет назад

Directory traversal vulnerability in WEBrick in Ruby 1.8 before 1.8.5-p115 and 1.8.6-p114, and 1.9 through 1.9.0-1, when running on systems that support backslash (\) path separators or case-insensitive file names, allows remote attackers to access arbitrary files via (1) "..%5c" (encoded backslash) sequences or (2) filenames that match patterns in the :NondisclosureName option.

redhat
больше 17 лет назад

Directory traversal vulnerability in WEBrick in Ruby 1.8 before 1.8.5-p115 and 1.8.6-p114, and 1.9 through 1.9.0-1, when running on systems that support backslash (\) path separators or case-insensitive file names, allows remote attackers to access arbitrary files via (1) "..%5c" (encoded backslash) sequences or (2) filenames that match patterns in the :NondisclosureName option.

nvd
больше 17 лет назад

Directory traversal vulnerability in WEBrick in Ruby 1.8 before 1.8.5-p115 and 1.8.6-p114, and 1.9 through 1.9.0-1, when running on systems that support backslash (\) path separators or case-insensitive file names, allows remote attackers to access arbitrary files via (1) "..%5c" (encoded backslash) sequences or (2) filenames that match patterns in the :NondisclosureName option.

github
около 3 лет назад

Directory traversal vulnerability in WEBrick in Ruby 1.8 before 1.8.5-p115 and 1.8.6-p114, and 1.9 through 1.9.0-1, when running on systems that support backslash (\) path separators or case-insensitive file names, allows remote attackers to access arbitrary files via (1) "..%5c" (encoded backslash) sequences or (2) filenames that match patterns in the :NondisclosureName option.

oracle-oval
больше 16 лет назад

ELSA-2008-0897: ruby security update (MODERATE)

EPSS

Процентиль: 99%
0.76719
Высокий