Ruby on Rails before 1.1.5 allows remote attackers to execute Ruby code with "severe" or "serious" impact via a File Upload request with an HTTP header that modifies the LOAD_PATH variable, a different vulnerability than CVE-2006-4112.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
References | () http://blog.koehntopp.de/archives/1367-Ruby-On-Rails-Mandatory-Mystery-Patch.html - Patch | |
References | () http://secunia.com/advisories/21466 - Vendor Advisory | |
References | () http://secunia.com/advisories/21749 - Vendor Advisory | |
References | () http://securitytracker.com/id?1016673 - | |
References | () http://weblog.rubyonrails.org/2006/8/9/rails-1-1-5-mandatory-security-patch-and-other-tidbits - Patch | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200608-20.xml - Patch, Vendor Advisory | |
References | () http://www.novell.com/linux/security/advisories/2006_21_sr.html - | |
References | () http://www.securityfocus.com/bid/19454 - Patch | |
References | () http://www.vupen.com/english/advisories/2006/3237 - Vendor Advisory |
Information
Published : 2006-08-14 21:04
Updated : 2024-11-21 00:15
NVD link : CVE-2006-4111
Mitre link : CVE-2006-4111
CVE.ORG link : CVE-2006-4111
JSON object : View
Products Affected
rubyonrails
- ruby_on_rails
- rails
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')