First published: Mon Feb 21 2011(Updated: )
actionpack/lib/action_view/template/resolver.rb in Ruby on Rails 3.0.x before 3.0.4, when a case-insensitive filesystem is used, does not properly implement filters associated with the list of available templates, which allows remote attackers to bypass intended access restrictions via an action name that uses an unintended case for alphabetic characters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ruby on Rails | =3.0.0-beta | |
Ruby on Rails | =3.0.0-beta2 | |
Ruby on Rails | =3.0.0-beta3 | |
Ruby on Rails | =3.0.0-beta4 | |
Ruby on Rails | =3.0.0-rc | |
Ruby on Rails | =3.0.0-rc2 | |
Ruby on Rails | =3.0.1-pre | |
Ruby on Rails | =3.0.2-pre | |
Ruby on Rails | =3.0.0 | |
Ruby on Rails | =3.0.1 | |
Ruby on Rails | =3.0.2 | |
Ruby on Rails | =3.0.3 | |
Ruby on Rails | =3.0.4-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-0449 has been classified with a significant severity rating due to its potential to allow unauthorized access.
To fix CVE-2011-0449, update Ruby on Rails to version 3.0.4 or later.
CVE-2011-0449 affects Ruby on Rails 3.0.x versions prior to 3.0.4.
CVE-2011-0449 could be exploited by attackers to bypass access restrictions on templates.
Yes, CVE-2011-0449 exploits issues that arise when using case-insensitive filesystems.