Podatność CVE-2008-1145


Publikacja: 2008-03-04   Modyfikacja: 2012-02-12

Opis:
Directory traversal vulnerability in WEBrick in Ruby 1.8 before 1.8.5-p115 and 1.8.6-p114, and 1.9 through 1.9.0-1, when running on systems that support backslash (\) path separators or case-insensitive file names, allows remote attackers to access arbitrary files via (1) "..%5c" (encoded backslash) sequences or (2) filenames that match patterns in the :NondisclosureName option.

Typ:

CWE-22

(Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:N/A:N)

Ogólna skala CVSS
Znaczenie
Łatwość wykorzystania
5/10
2.9/10
10/10
Wymagany dostęp
Złożoność ataku
Autoryzacja
Zdalny
Niska
Nie wymagana
Wpływ na poufność
Wpływ na integralność
Wpływ na dostępność
Częściowy
Brak
Brak
Affected software
Webrick -> Webrick 

 Referencje:
http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
http://support.apple.com/kb/HT2163
http://wiki.rpath.com/Advisories:rPSA-2008-0123
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0123
http://www.kb.cert.org/vuls/id/404515
http://www.mandriva.com/security/advisories?name=MDVSA-2008:141
http://www.mandriva.com/security/advisories?name=MDVSA-2008:142
http://www.redhat.com/support/errata/RHSA-2008-0897.html
http://www.ruby-lang.org/en/news/2008/03/03/webrick-file-access-vulnerability/
http://www.securityfocus.com/archive/1/489205/100/0/threaded
http://www.securityfocus.com/archive/1/489218/100/0/threaded
http://www.securityfocus.com/archive/1/490056/100/0/threaded
http://www.securityfocus.com/bid/28123
http://www.securitytracker.com/id?1019562
http://www.vupen.com/english/advisories/2008/0787
http://www.vupen.com/english/advisories/2008/1981/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/41010
https://issues.rpath.com/browse/RPL-2338
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10937
https://www.exploit-db.com/exploits/5215
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00338.html
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00354.html

Copyright 2024, cxsecurity.com

 

Back to Top