First published: Mon Mar 03 2008(Updated: )
<a href="http://www.ruby-lang.org/en/news/2008/03/03/webrick-file-access-vulnerability/">http://www.ruby-lang.org/en/news/2008/03/03/webrick-file-access-vulnerability/</a> WEBrick, a standard library of Ruby to implement HTTP servers, has file access vulnerability. 1. Systems that accept backslash (\) as a path separator, such as Windows. 2. Systems that use case insensitive filesystems such as NTFS on Windows, HFS on Mac OS X. Attacker can access private files by sending a url with url encoded backslash (\). This works only on systems that accept backslash as a path separator. Or they could bypass restrictions with case-insensitive filesystems.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Webrick Webrick | <=1.9 | |
Webrick Webrick | <=1.9_1 | |
Webrick Webrick | <=1.8 | |
Webrick Webrick | <=1.8_p115 | |
Webrick Webrick | <=1.8_p114 | |
redhat/ruby | <0:1.8.1-7.el4_7.1 | 0:1.8.1-7.el4_7.1 |
redhat/ruby | <0:1.8.5-5.el5_2.5 | 0:1.8.5-5.el5_2.5 |
Ruby-lang Webrick Ruby | ||
Ruby-lang Ruby | >=1.8.0<1.8.5.115 | |
Ruby-lang Ruby | >=1.8.6<1.8.6.114 | |
Ruby-lang Ruby | =1.9.0 | |
Ruby-lang Ruby | =1.9.0.1 | |
Fedoraproject Fedora | =7 | |
Fedoraproject Fedora | =8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.