Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2009-4492

Опубликовано: 13 янв. 2010
Источник: debian
EPSS Средний

Описание

WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ruby1.8fixed1.8.7.249-1package
ruby1.9removedpackage
ruby1.9.1fixed1.9.1.378-1package

Примечания

  • The actual issue is within the broken terminal emulators and needs to be fixed there, see CVE-2009-4487

  • same as CVE-2009-4487

EPSS

Процентиль: 93%
0.10657
Средний

Связанные уязвимости

ubuntu
почти 16 лет назад

WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.

redhat
почти 16 лет назад

WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.

nvd
почти 16 лет назад

WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.

github
около 8 лет назад

WEBrick Improper Input Validation vulnerability

oracle-oval
больше 14 лет назад

ELSA-2011-0909: ruby security update (MODERATE)

EPSS

Процентиль: 93%
0.10657
Средний