Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2013-0262

Опубликовано: 08 фев. 2013
Источник: debian
EPSS Низкий

Описание

rack/file.rb (Rack::File) in Rack 1.5.x before 1.5.2 and 1.4.x before 1.4.5 allows attackers to access arbitrary files outside the intended root directory via a crafted PATH_INFO environment variable, probably a directory traversal vulnerability that is remotely exploitable, aka "symlink path traversals."

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ruby-rackfixed1.4.1-2.1package
librack-rubynot-affectedpackage

Примечания

  • Patches in git, commit 6f237e4c9fab649d3750482514f0fde76c56ab30

EPSS

Процентиль: 74%
0.00826
Низкий

Связанные уязвимости

ubuntu
почти 13 лет назад

rack/file.rb (Rack::File) in Rack 1.5.x before 1.5.2 and 1.4.x before 1.4.5 allows attackers to access arbitrary files outside the intended root directory via a crafted PATH_INFO environment variable, probably a directory traversal vulnerability that is remotely exploitable, aka "symlink path traversals."

redhat
около 13 лет назад

rack/file.rb (Rack::File) in Rack 1.5.x before 1.5.2 and 1.4.x before 1.4.5 allows attackers to access arbitrary files outside the intended root directory via a crafted PATH_INFO environment variable, probably a directory traversal vulnerability that is remotely exploitable, aka "symlink path traversals."

nvd
почти 13 лет назад

rack/file.rb (Rack::File) in Rack 1.5.x before 1.5.2 and 1.4.x before 1.4.5 allows attackers to access arbitrary files outside the intended root directory via a crafted PATH_INFO environment variable, probably a directory traversal vulnerability that is remotely exploitable, aka "symlink path traversals."

github
больше 8 лет назад

Rack Vulnerable to Path Traversal

EPSS

Процентиль: 74%
0.00826
Низкий