5

CVE-2008-1145

Exploit

Directory traversal vulnerability in WEBrick in Ruby 1.8 before 1.8.5-p115 and 1.8.6-p114, and 1.9 through 1.9.0-1, when running on systems that support backslash (\) path separators or case-insensitive file names, allows remote attackers to access arbitrary files via (1) "..%5c" (encoded backslash) sequences or (2) filenames that match patterns in the :NondisclosureName option.

Data is provided by the National Vulnerability Database (NVD)
Ruby-langWebrick Version- SwPlatformruby
   Ruby-langRuby Version >= 1.8.0 < 1.8.5.115
   Ruby-langRuby Version >= 1.8.6 < 1.8.6.114
   Ruby-langRuby Version1.9.0
   Ruby-langRuby Version1.9.0.1
FedoraprojectFedora Version7
FedoraprojectFedora Version8
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 72.77% 0.987
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:P/I:N/A:N
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.

http://secunia.com/advisories/29232
Vendor Advisory
Not Applicable
http://secunia.com/advisories/29357
Vendor Advisory
Not Applicable
http://www.kb.cert.org/vuls/id/404515
Third Party Advisory
US Government Resource
http://www.securityfocus.com/bid/28123
Third Party Advisory
Broken Link
VDB Entry
http://www.securitytracker.com/id?1019562
Third Party Advisory
Broken Link
VDB Entry
https://www.exploit-db.com/exploits/5215
Third Party Advisory
Exploit
VDB Entry