Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-fjfg-q662-gm6j

Опубликовано: 24 окт. 2017
Источник: github
Github: Прошло ревью

Описание

Moderate severity vulnerability that affects rails

Rails before 1.2.4, as used for Ruby on Rails, allows remote attackers and ActiveResource servers to determine the existence of arbitrary files and read arbitrary XML files via the Hash.from_xml (Hash#from_xml) method, which uses XmlSimple (XML::Simple) unsafely, as demonstrated by reading passwords from the Pidgin (Gaim) .purple/accounts.xml file.

Пакеты

Наименование

rails

rubygems
Затронутые версииВерсия исправления

< 1.2.4

1.2.4

EPSS

Процентиль: 93%
0.10003
Средний

Дефекты

CWE-200

Связанные уязвимости

ubuntu
почти 18 лет назад

Rails before 1.2.4, as used for Ruby on Rails, allows remote attackers and ActiveResource servers to determine the existence of arbitrary files and read arbitrary XML files via the Hash.from_xml (Hash#from_xml) method, which uses XmlSimple (XML::Simple) unsafely, as demonstrated by reading passwords from the Pidgin (Gaim) .purple/accounts.xml file.

nvd
почти 18 лет назад

Rails before 1.2.4, as used for Ruby on Rails, allows remote attackers and ActiveResource servers to determine the existence of arbitrary files and read arbitrary XML files via the Hash.from_xml (Hash#from_xml) method, which uses XmlSimple (XML::Simple) unsafely, as demonstrated by reading passwords from the Pidgin (Gaim) .purple/accounts.xml file.

debian
почти 18 лет назад

Rails before 1.2.4, as used for Ruby on Rails, allows remote attackers ...

EPSS

Процентиль: 93%
0.10003
Средний

Дефекты

CWE-200