ADVISORIES
GEM
SEVERITY
CVSS v2.0: 7.5 (High)
UNAFFECTED VERSIONS
- < 1.1.0
PATCHED VERSIONS
- >= 1.1.6
DESCRIPTION
Ruby on Rails before 1.1.5 allows remote attackers to execute Ruby code with "severe" or "serious" impact via a File Upload request with an HTTP header that modifies the LOAD_PATH variable, a different vulnerability than CVE-2006-4112.
RELATED
- https://nvd.nist.gov/vuln/detail/CVE-2006-4111
- https://github.com/presidentbeef/rails-security-history/blob/master/vulnerabilities.md
- https://blog.evanweaver.com/2006/08/12/anatomy-of-an-attack-against-1-1-4
- https://rubyonrails.org/2006/8/10/rails-1-1-6-backports-and-full-disclosure
- http://weblog.rubyonrails.org/2006/8/9/rails-1-1-5-mandatory-security-patch-and-other-tidbits
- https://github.com/advisories/GHSA-rvpq-5xqx-pfpp
- http://www.gentoo.org/security/en/glsa/glsa-200608-20.xml