Sha256: 08a0edb02ae99a038551a0c5aeaf13b2518dc98d213a6960955677b96561c2f8
Contents?: true
Size: 843 Bytes
Versions: 3
Compression:
Stored size: 843 Bytes
Contents
--- engine: ruby cve: 2018-8780 url: https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/ title: Unintentional directory traversal by poisoned NUL byte in Dir date: 2018-03-28 description: | There is an unintentional directory traversal in some methods in `Dir` `Dir.open`, `Dir.new`, `Dir.entries` and `Dir.empty?` accept the path of the target directory as their parameter. If the parameter contains NUL (`\0`) bytes, these methods recognize that the path is completed before the NUL bytes. So, if a script accepts an external input as the argument of these methods, the attacker can make the unintentional directory traversal. All users running an affected release should upgrade immediately. patched_versions: - "~> 2.2.10" - "~> 2.3.7" - "~> 2.4.4" - "~> 2.5.1" - "> 2.6.0-preview1"
Version data entries
3 entries across 3 versions & 2 rubygems