Sha256: cd818384239c9d5b2ea2bf8fb0411181d3774b8f521147140eeb765c7c43c459
Contents?: true
Size: 489 Bytes
Versions: 2
Compression:
Stored size: 489 Bytes
Contents
--- gem: rubyzip cve: 2017-5946 url: https://github.com/rubyzip/rubyzip/issues/315 title: Directory traversal vulnerability in rubyzip date: 2017-02-27 description: | The Zip::File component in the rubyzip gem before 1.2.1 for Ruby has a directory traversal vulnerability. If a site allows uploading of .zip files, an attacker can upload a malicious file that uses "../" pathname substrings to write arbitrary files to the filesystem. cvss_v3: 6.1 patched_versions: - ">= 1.2.1"
Version data entries
2 entries across 2 versions & 1 rubygems
Version | Path |
---|---|
bundler-audit-0.6.1 | data/ruby-advisory-db/gems/rubyzip/CVE-2017-5946.yml |
bundler-audit-0.6.0 | data/ruby-advisory-db/gems/rubyzip/CVE-2017-5946.yml |