5
CVSSv2

CVE-2011-1005

Published: 02/03/2011 Updated: 13/08/2013
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

The safe-level feature in Ruby 1.8.6 up to and including 1.8.6-420, 1.8.7 up to and including 1.8.7-330, and 1.8.8dev allows context-dependent malicious users to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.

Vulnerable Product Search on Vulmon Subscribe to Product

ruby-lang ruby 1.8.7-330

ruby-lang ruby 1.8.8

ruby-lang ruby 1.8.6-420

ruby-lang ruby 1.8.7

ruby-lang ruby 1.8.6

Vendor Advisories

Synopsis Moderate: ruby security update Type/Severity Security Advisory: Moderate Topic Updated ruby packages that fix two security issues are now available forRed Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as having moderatesecurity impact Common Vulnerability Scoring ...
Synopsis Moderate: ruby security and bug fix update Type/Severity Security Advisory: Moderate Topic Updated ruby packages that fix two security issues and one bug are nowavailable for Red Hat Enterprise Linux 5The Red Hat Security Response Team has rated this update as having moderatesecurity impact Commo ...
Several security issues were fixed in ruby18 ...
Several security issues were fixed in ruby191 ...
It was discovered that Ruby's REXML library did not properly restrict XML entity expansion An attacker could use this flaw to cause a denial of service by tricking a Ruby application using REXML to read text nodes from specially-crafted XML content, which will result in REXML consuming large amounts of system memory (CVE-2013-1821) It was found t ...