Sha256: 08a0edb02ae99a038551a0c5aeaf13b2518dc98d213a6960955677b96561c2f8

Contents?: true

Size: 843 Bytes

Versions: 3

Compression:

Stored size: 843 Bytes

Contents

---
engine: ruby
cve: 2018-8780
url: https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/
title: Unintentional directory traversal by poisoned NUL byte in Dir
date: 2018-03-28
description: |
  There is an unintentional directory traversal in some methods in `Dir`

  `Dir.open`, `Dir.new`, `Dir.entries` and `Dir.empty?` accept the path of the
  target directory as their parameter. If the parameter contains NUL (`\0`)
  bytes, these methods recognize that the path is completed before the NUL bytes.
  So, if a script accepts an external input as the argument of these methods, the
  attacker can make the unintentional directory traversal.

  All users running an affected release should upgrade immediately.
patched_versions:
  - "~> 2.2.10"
  - "~> 2.3.7"
  - "~> 2.4.4"
  - "~> 2.5.1"
  - "> 2.6.0-preview1"

Version data entries

3 entries across 3 versions & 2 rubygems

Version Path
bundler-audit-0.7.0.1 data/ruby-advisory-db/rubies/ruby/CVE-2018-8780.yml
bundler-budit-0.6.2 data/ruby-advisory-db/rubies/ruby/CVE-2018-8780.yml
bundler-budit-0.6.1 data/ruby-advisory-db/rubies/ruby/CVE-2018-8780.yml