Sha256: 76bc69ef0906326d3e826acdf3a57c4e83c69f9d74622d9519554df7fa32c332
Contents?: true
Size: 653 Bytes
Versions: 1
Compression:
Stored size: 653 Bytes
Contents
--- gem: mail cve: 2012-2139 osvdb: 81631 url: https://nvd.nist.gov/vuln/detail/CVE-2012-2139 title: Mail Gem for Ruby File Delivery Method to Parameter Traversal Arbitrary File Manipulation date: 2012-03-14 description: | Mail Gem for Ruby contains a flaw that allows a remote attacker to traverse outside of a restricted path. The issue is due to the program not properly sanitizing user input, specifically directory traversal style attacks (e.g., ../../) supplied via the 'to' parameter within the delivery method. This directory traversal attack would allow the attacker to modify arbitrary files. cvss_v2: 5.0 patched_versions: - ">= 2.4.4"
Version data entries
1 entries across 1 versions & 1 rubygems
Version | Path |
---|---|
bundler-audit-0.7.0.1 | data/ruby-advisory-db/gems/mail/CVE-2012-2139.yml |