First published: Fri Oct 19 2007(Updated: )
Rails before 1.2.4, as used for Ruby on Rails, allows remote attackers and ActiveResource servers to determine the existence of arbitrary files and read arbitrary XML files via the Hash.from_xml (Hash#from_xml) method, which uses XmlSimple (XML::Simple) unsafely, as demonstrated by reading passwords from the Pidgin (Gaim) .purple/accounts.xml file.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/rails | <1.2.4 | 1.2.5 |
Ruby on Rails | <=1.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5379 has a medium severity rating, as it allows attackers to read arbitrary XML files remotely.
To fix CVE-2007-5379, upgrade Rails to version 1.2.5 or later.
CVE-2007-5379 affects Rails versions before 1.2.4.
Yes, CVE-2007-5379 can be exploited remotely by attackers to gain access to sensitive files.
The vulnerability in CVE-2007-5379 is due to the unsafe use of the Hash.from_xml method.