CVE-2008-1145
WEBrick <1.8.5-p115, 1.8.6-p114, 1.9-1.9.0-1 - Path Traversal
Title source: llmDescription
Directory traversal vulnerability in WEBrick in Ruby 1.8 before 1.8.5-p115 and 1.8.6-p114, and 1.9 through 1.9.0-1, when running on systems that support backslash (\) path separators or case-insensitive file names, allows remote attackers to access arbitrary files via (1) "..%5c" (encoded backslash) sequences or (2) filenames that match patterns in the :NondisclosureName option.
Exploits (1)
References (29)
Core 29
Core References
Mailing List, Third Party Advisory vendor-advisory
x_refsource_suse
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html
Broken Link x_refsource_confirm
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0123
Third Party Advisory x_refsource_confirm
http://support.apple.com/kb/HT2163
Not Applicable, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/29357
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/490056/100/0/threaded
Third Party Advisory, US Government Resource third-party-advisory
x_refsource_cert-vn
http://www.kb.cert.org/vuls/id/404515
Broken Link, Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/28123
Broken Link vendor-advisory
x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDVSA-2008:141
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/489205/100/0/threaded
Permissions Required vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2008/1981/references
Exploit, Third Party Advisory, VDB Entry exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/5215
Not Applicable, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/29232
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/41010
Not Applicable third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/31687
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/489218/100/0/threaded
Third Party Advisory vendor-advisory
x_refsource_fedora
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00354.html
Third Party Advisory vendor-advisory
x_refsource_redhat
http://www.redhat.com/support/errata/RHSA-2008-0897.html
Broken Link, Mailing List vendor-advisory
x_refsource_apple
http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html
Exploit, Patch, Vendor Advisory x_refsource_confirm
http://www.ruby-lang.org/en/news/2008/03/03/webrick-file-access-vulnerability/
Permissions Required vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2008/0787
Not Applicable third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/30802
Broken Link vdb-entry
signature
x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10937
Broken Link, Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://www.securitytracker.com/id?1019562
Broken Link x_refsource_confirm
https://issues.rpath.com/browse/RPL-2338
Not Applicable third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/32371
Broken Link vendor-advisory
x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDVSA-2008:142
Not Applicable third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/29536
Third Party Advisory vendor-advisory
x_refsource_fedora
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00338.html
Broken Link x_refsource_confirm
http://wiki.rpath.com/Advisories:rPSA-2008-0123
Scores
EPSS
0.5985
EPSS Percentile
98.3%
Details
CWE
CWE-22
Status
published
Products (3)
fedoraproject/fedora
7
fedoraproject/fedora
8
ruby-lang/webrick
Published
Mar 04, 2008
Tracked Since
Feb 18, 2026