First published: Tue Mar 04 2008(Updated: )
<a href="http://www.ruby-lang.org/en/news/2008/03/03/webrick-file-access-vulnerability/">http://www.ruby-lang.org/en/news/2008/03/03/webrick-file-access-vulnerability/</a> WEBrick, a standard library of Ruby to implement HTTP servers, has file access vulnerability. 1. Systems that accept backslash (\) as a path separator, such as Windows. 2. Systems that use case insensitive filesystems such as NTFS on Windows, HFS on Mac OS X. Attacker can access private files by sending a url with url encoded backslash (\). This works only on systems that accept backslash as a path separator. Or they could bypass restrictions with case-insensitive filesystems.
Affected Software | Affected Version | How to fix |
---|---|---|
WEBrick |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-435902 is considered high due to the potential for unauthorized file access.
To fix REDHAT-BUG-435902, it is recommended to upgrade to the latest version of Ruby that addresses this vulnerability.
REDHAT-BUG-435902 affects the WEBrick library in Ruby, which is used for implementing HTTP servers.
Yes, REDHAT-BUG-435902 can lead to data exposure by allowing attackers to access sensitive files on the server.
Yes, REDHAT-BUG-435902 is exploitable remotely, making it critical to apply patches promptly.