Lucene search

K
Ruby-langWebrick

4 matches found

CVE
CVE
added 2020/10/06 1:15 p.m.629 views

CVE-2020-25613

An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poo...

7.5CVSS7.7AI score0.00221EPSS
CVE
CVE
added 2008/03/04 11:44 p.m.178 views

CVE-2008-1145

Directory traversal vulnerability in WEBrick in Ruby 1.8 before 1.8.5-p115 and 1.8.6-p114, and 1.9 through 1.9.0-1, when running on systems that support backslash () path separators or case-insensitive file names, allows remote attackers to access arbitrary files via (1) "..%5c" (encoded backslash)...

5CVSS6.6AI score0.76719EPSS
CVE
CVE
added 2010/01/13 8:30 p.m.106 views

CVE-2009-4492

WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary ...

7.5CVSS7.5AI score0.18944EPSS
CVE
CVE
added 2019/05/10 4:29 p.m.54 views

CVE-2019-11879

The WEBrick gem 1.4.2 for Ruby allows directory traversal if the attacker once had local access to create a symlink to a location outside of the web root directory. NOTE: The vendor states that this is analogous to Options FollowSymlinks in the Apache HTTP Server, and therefore it is "not a problem...

5.5CVSS5.4AI score0.00048EPSS