First published: Mon Aug 14 2006(Updated: )
Ruby on Rails before 1.1.5 allows remote attackers to execute Ruby code with "severe" or "serious" impact via a File Upload request with an HTTP header that modifies the LOAD_PATH variable, a different vulnerability than CVE-2006-4112.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ruby on Rails | =0.8.0 | |
Ruby on Rails | =0.5.7 | |
Ruby on Rails | =0.7.0 | |
Ruby on Rails | <=1.1.4 | |
Ruby on Rails | =0.8.5 | |
Ruby on Rails | =0.6.0 | |
Ruby on Rails | =0.5.6 | |
Ruby on Rails | =0.9.0 | |
Ruby on Rails | =0.5.5 | |
Ruby on Rails | =0.5.0 | |
Ruby on Rails | =0.6.5 | |
Ruby on Rails | =0.9.1 | |
Ruby on Rails | =0.9.2 | |
Ruby on Rails | =0.9.3 | |
Ruby on Rails | =0.9.4 | |
Ruby on Rails | =0.9.4.1 | |
Ruby on Rails | =0.10.0 | |
Ruby on Rails | =0.10.1 | |
Ruby on Rails | =0.11.0 | |
Ruby on Rails | =0.11.1 | |
Ruby on Rails | =0.12.0 | |
Ruby on Rails | =0.12.1 | |
Ruby on Rails | =0.13.0 | |
Ruby on Rails | =0.13.1 | |
Ruby on Rails | =0.14.1 | |
Ruby on Rails | =0.14.2 | |
Ruby on Rails | =0.14.3 | |
Ruby on Rails | =0.14.4 | |
Ruby on Rails | =1.0.0 | |
Ruby on Rails | =1.1.1 | |
Ruby on Rails | =1.1.2 | |
Ruby on Rails | =1.1.3 | |
Ruby on Rails | =1.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4111 has been classified as a severe vulnerability allowing remote code execution.
To fix CVE-2006-4111, you should upgrade to Ruby on Rails version 1.1.5 or later.
CVE-2006-4111 affects Ruby on Rails versions prior to 1.1.5, including 0.5.0 through 1.1.4.
CVE-2006-4111 can be exploited via a malicious file upload that modifies the LOAD_PATH variable.
Yes, CVE-2006-4111 is a different vulnerability than CVE-2006-4112, although both affect Ruby on Rails.