CVE-2019-11879

The WEBrick gem 1.4.2 for Ruby allows directory traversal if the attacker once had local access to create a symlink to a location outside of the web root directory. NOTE: The vendor states that this is analogous to Options FollowSymlinks in the Apache HTTP Server, and therefore it is "not a problem.
References
Link Resource
https://bugs.ruby-lang.org/issues/15835 Issue Tracking Vendor Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:ruby-lang:webrick:1.4.2:*:*:*:*:ruby:*:*

History

07 Nov 2023, 03:03

Type Values Removed Values Added
Summary ** DISPUTED ** The WEBrick gem 1.4.2 for Ruby allows directory traversal if the attacker once had local access to create a symlink to a location outside of the web root directory. NOTE: The vendor states that this is analogous to Options FollowSymlinks in the Apache HTTP Server, and therefore it is "not a problem." The WEBrick gem 1.4.2 for Ruby allows directory traversal if the attacker once had local access to create a symlink to a location outside of the web root directory. NOTE: The vendor states that this is analogous to Options FollowSymlinks in the Apache HTTP Server, and therefore it is "not a problem.

Information

Published : 2019-05-10 16:29

Updated : 2024-08-04 23:15


NVD link : CVE-2019-11879

Mitre link : CVE-2019-11879

CVE.ORG link : CVE-2019-11879


JSON object : View

Products Affected

ruby-lang

  • webrick
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-59

Improper Link Resolution Before File Access ('Link Following')