First published: Tue Nov 26 2019(Updated: )
Various methods in WEBrick::HTTPRequest in Ruby 1.9.2 and 1.8.7 and earlier do not validate the X-Forwarded-For, X-Forwarded-Host and X-Forwarded-Server headers in requests, which might allow remote attackers to inject arbitrary text into log files or bypass intended address parsing via a crafted header.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ruby-lang Ruby | =1.9.2 | |
Ruby-lang Ruby | =1.8.7 | |
debian/ruby1.8 | ||
debian/ruby1.9 | ||
debian/ruby1.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3624 is a vulnerability in Ruby 1.9.2 and 1.8.7 and earlier versions that allows remote attackers to inject arbitrary text into log files or bypass intended address parsing.
The severity of CVE-2011-3624 is medium with a CVSS score of 5.3.
CVE-2011-3624 affects Ruby versions 1.9.2 and 1.8.7 and earlier.
Remote attackers can exploit CVE-2011-3624 by injecting arbitrary text into log files or bypassing intended address parsing.
No known remedies are available for CVE-2011-3624 at this time.