Sha256: 12d906b123926eba83d65d1205a3bc371adec6b66386ae52cce431cb5ee1e71a

Contents?: true

Size: 692 Bytes

Versions: 6

Compression:

Stored size: 692 Bytes

Contents

---
engine: ruby
cve: 2009-4492
osvdb: 61774
url: http://www.osvdb.org/show/osvdb/61774
title: WEBrick HTTP Request Escape Sequence Terminal Command Injection
date: 2010-01-10
description: |
  WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383,
  1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev
  writes data to a log file without sanitizing non-printable characters, which might
  allow remote attackers to modify a window''s title, or possibly execute arbitrary
  commands or overwrite files, via an HTTP request containing an escape sequence for
  a terminal emulator.
cvss_v2: 5.0
patched_versions:
  - ~> 1.8.6.388
  - ~> 1.8.7.249
  - ">= 1.9.1.378"

Version data entries

6 entries across 6 versions & 2 rubygems

Version Path
bundler-audit-0.7.0.1 data/ruby-advisory-db/rubies/ruby/CVE-2009-4492.yml
bundler-budit-0.6.2 data/ruby-advisory-db/rubies/ruby/OSVDB-61774.yml
bundler-budit-0.6.1 data/ruby-advisory-db/rubies/ruby/OSVDB-61774.yml
bundler-audit-0.6.1 data/ruby-advisory-db/rubies/ruby/OSVDB-61774.yml
bundler-audit-0.6.0 data/ruby-advisory-db/rubies/ruby/OSVDB-61774.yml
bundler-audit-0.5.0 data/ruby-advisory-db/rubies/ruby/OSVDB-61774.yml