First published: Sat Nov 24 2012(Updated: )
The rb_get_path_check function in file.c in Ruby 1.9.3 before patchlevel 286 and Ruby 2.0.0 before r37163 allows context-dependent attackers to create files in unexpected locations or with unexpected names via a NUL byte in a file path.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ruby | =1.9.3 | |
Ruby | =2.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-4522 has a medium severity rating, allowing attackers to exploit file creation vulnerabilities.
To fix CVE-2012-4522, update Ruby to version 1.9.3 patchlevel 286 or later, or 2.0.0 revision r37163 or later.
Exploitation of CVE-2012-4522 can lead to the creation of files in unexpected locations, potentially compromising system integrity.
CVE-2012-4522 affects Ruby versions 1.9.3 prior to patchlevel 286 and 2.0.0 prior to r37163.
CVE-2012-4522 requires context-dependent access, meaning it cannot be exploited remotely without specific conditions.