Sha256: 17edb96835b49fef61455bf43989b82a97be9ddaca6d3f1563bf81d1f012a98f

Contents?: true

Size: 969 Bytes

Versions: 1

Compression:

Stored size: 969 Bytes

Contents

---
gem: rack
cve: 2020-8161
url: https://groups.google.com/forum/#!topic/ruby-security-ann/T4ZIsfRf2eA
date: 2020-05-12
title: Directory traversal in Rack::Directory app bundled with Rack
description: |
  There was a possible directory traversal vulnerability in the Rack::Directory app
  that is bundled with Rack.

  Versions Affected:  rack < 2.2.0
  Not affected:       Applications that do not use Rack::Directory.
  Fixed Versions:     2.1.3, >= 2.2.0

  Impact
  ------

  If certain directories exist in a director that is managed by
  `Rack::Directory`, an attacker could, using this vulnerability, read the
  contents of files on the server that were outside of the root specified in the
  Rack::Directory initializer.

  Workarounds
  -----------

  Until such time as the patch is applied or their Rack version is upgraded,
  we recommend that developers do not use Rack::Directory in their
  applications.

patched_versions:
  - "~> 2.1.3"
  - ">= 2.2.0"

Version data entries

1 entries across 1 versions & 1 rubygems

Version Path
bundler-audit-0.7.0.1 data/ruby-advisory-db/gems/rack/CVE-2020-8161.yml