7.5
CVSSv2

CVE-2009-4492

Published: 13/01/2010 Updated: 01/08/2023
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote malicious users to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.

Vulnerable Product Search on Vulmon Subscribe to Product

ruby-lang webrick 1.3.1

Vendor Advisories

Emmanouel Kellinis discovered that Ruby did not properly handle certain string operations An attacker could exploit this issue and possibly execute arbitrary code with application privileges (CVE-2009-4124) ...

Exploits

source: wwwsecurityfocuscom/bid/37710/info Ruby WEBrick is prone to a command-injection vulnerability because it fails to adequately sanitize user-supplied input in log files Attackers can exploit this issue to execute arbitrary commands in a terminal Versions *prior to* the following are affected: Ruby 186 patchlevel 388 Ruby 18 ...
Nginx, Varnish, Cherokee, thttpd, mini-httpd, WEBrick, Orion, AOLserver, Yaws and Boa are subject to log escape sequence injection vulnerabilities ...