actionpack/lib/action_view/template/resolver.rb in Ruby on Rails 3.0.x before 3.0.4, when a case-insensitive filesystem is used, does not properly implement filters associated with the list of available templates, which allows remote attackers to bypass intended access restrictions via an action name that uses an unintended case for alphabetic characters.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:24
Type | Values Removed | Values Added |
---|---|---|
References | () http://groups.google.com/group/rubyonrails-security/msg/04345b2e84df5b4f?dmode=source&output=gplain - | |
References | () http://lists.fedoraproject.org/pipermail/package-announce/2011-April/057650.html - | |
References | () http://secunia.com/advisories/43278 - Vendor Advisory | |
References | () http://securitytracker.com/id?1025061 - | |
References | () http://weblog.rubyonrails.org/2011/2/8/new-releases-2-3-11-and-3-0-4 - Patch | |
References | () http://www.vupen.com/english/advisories/2011/0877 - |
Information
Published : 2011-02-21 18:00
Updated : 2024-11-21 01:24
NVD link : CVE-2011-0449
Mitre link : CVE-2011-0449
CVE.ORG link : CVE-2011-0449
JSON object : View
Products Affected
rubyonrails
- rails
CWE
CWE-264
Permissions, Privileges, and Access Controls