First published: Mon Mar 03 2008(Updated: )
<a href="http://www.ruby-lang.org/en/news/2008/03/03/webrick-file-access-vulnerability/">http://www.ruby-lang.org/en/news/2008/03/03/webrick-file-access-vulnerability/</a> WEBrick, a standard library of Ruby to implement HTTP servers, has file access vulnerability. 1. Systems that accept backslash (\) as a path separator, such as Windows. 2. Systems that use case insensitive filesystems such as NTFS on Windows, HFS on Mac OS X. Attacker can access private files by sending a url with url encoded backslash (\). This works only on systems that accept backslash as a path separator. Or they could bypass restrictions with case-insensitive filesystems.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/ruby | <0:1.8.1-7.el4_7.1 | 0:1.8.1-7.el4_7.1 |
redhat/ruby | <0:1.8.5-5.el5_2.5 | 0:1.8.5-5.el5_2.5 |
WEBrick | <=1.9 | |
WEBrick | <=1.9_1 | |
WEBrick | <=1.8 | |
WEBrick | <=1.8_p115 | |
WEBrick | <=1.8_p114 | |
WEBrick | ||
Ruby | >=1.8.0<1.8.5.115 | |
Ruby | >=1.8.6<1.8.6.114 | |
Ruby | =1.9.0 | |
Ruby | =1.9.0.1 | |
Fedora | =7 | |
Fedora | =8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1145 is classified as a moderate severity vulnerability due to its potential to expose sensitive files.
To mitigate CVE-2008-1145, upgrade to a version of Ruby that is patched for this vulnerability, such as Ruby 1.8.6 or later.
CVE-2008-1145 affects all versions of WEBrick prior to 1.8.6 and 1.9.0.
If you are using Ruby versions 1.8.0 to 1.8.5 or any version before 1.8.6, your installation may be vulnerable to CVE-2008-1145.
Exploiting CVE-2008-1145 could allow an attacker to access arbitrary files on the server, leading to potential data exposure.