CVE-2008-1145

WEBrick <1.8.5-p115, 1.8.6-p114, 1.9-1.9.0-1 - Path Traversal

Title source: llm
STIX 2.1

Description

Directory traversal vulnerability in WEBrick in Ruby 1.8 before 1.8.5-p115 and 1.8.6-p114, and 1.9 through 1.9.0-1, when running on systems that support backslash (\) path separators or case-insensitive file names, allows remote attackers to access arbitrary files via (1) "..%5c" (encoded backslash) sequences or (2) filenames that match patterns in the :NondisclosureName option.

Exploits (1)

exploitdb WRITEUP VERIFIED
by DSecRG · textremotemultiple
https://www.exploit-db.com/exploits/5215

References (29)

Core 29
Core References
Mailing List, Third Party Advisory vendor-advisory x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
Third Party Advisory x_refsource_confirm
http://support.apple.com/kb/HT2163
Not Applicable, Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/29357
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/490056/100/0/threaded
Third Party Advisory, US Government Resource third-party-advisory x_refsource_cert-vn
http://www.kb.cert.org/vuls/id/404515
Broken Link, Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/28123
Broken Link vendor-advisory x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDVSA-2008:141
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/489205/100/0/threaded
Permissions Required vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2008/1981/references
Exploit, Third Party Advisory, VDB Entry exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/5215
Not Applicable, Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/29232
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/41010
Not Applicable third-party-advisory x_refsource_secunia
http://secunia.com/advisories/31687
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/489218/100/0/threaded
Third Party Advisory vendor-advisory x_refsource_fedora
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00354.html
Third Party Advisory vendor-advisory x_refsource_redhat
http://www.redhat.com/support/errata/RHSA-2008-0897.html
Broken Link, Mailing List vendor-advisory x_refsource_apple
http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html
Exploit, Patch, Vendor Advisory x_refsource_confirm
http://www.ruby-lang.org/en/news/2008/03/03/webrick-file-access-vulnerability/
Permissions Required vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2008/0787
Not Applicable third-party-advisory x_refsource_secunia
http://secunia.com/advisories/30802
Broken Link, Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://www.securitytracker.com/id?1019562
Broken Link x_refsource_confirm
https://issues.rpath.com/browse/RPL-2338
Not Applicable third-party-advisory x_refsource_secunia
http://secunia.com/advisories/32371
Broken Link vendor-advisory x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDVSA-2008:142
Not Applicable third-party-advisory x_refsource_secunia
http://secunia.com/advisories/29536
Third Party Advisory vendor-advisory x_refsource_fedora
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00338.html
Broken Link x_refsource_confirm
http://wiki.rpath.com/Advisories:rPSA-2008-0123

Scores

EPSS 0.5985
EPSS Percentile 98.3%

Details

CWE
CWE-22
Status published
Products (3)
fedoraproject/fedora 7
fedoraproject/fedora 8
ruby-lang/webrick
Published Mar 04, 2008
Tracked Since Feb 18, 2026