Sha256: 9fbdab8fae2b2f4cab2dbc013b7105b8538f6a8a89802900a43f4c7f0b269a5a
Contents?: true
Size: 602 Bytes
Versions: 1
Compression:
Stored size: 602 Bytes
Contents
--- url: http://www.osvdb.org/show/osvdb/81631 title: Mail Gem for Ruby File Delivery Method to Parameter Traversal Arbitrary File Manipulation description: > Mail Gem for Ruby contains a flaw that allows a remote attacker to traverse outside of a restricted path. The issue is due to the program not properly sanitizing user input, specifically directory traversal style attacks (e.g., ../../) supplied via the 'to' parameter within the delivery method. This directory traversal attack would allow the attacker to modify arbitrary files. cvss_v2: 5.0 patched_versions: - ">= 2.4.4"
Version data entries
1 entries across 1 versions & 1 rubygems
Version | Path |
---|---|
bundler-audit-0.1.1 | data/bundler/audit/mail/2012-2139.yml |