5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
ruby is vulnerable to privilege escalation. It was found that WEBrick (the Ruby HTTP server toolkit) did not filter terminal escape sequences from its log files. A remote attacker could use specially-crafted HTTP requests to inject terminal escape sequences into the WEBrick log files. If a victim viewed the log files with a terminal emulator, it could result in control characters being executed with the privileges of that user.
secunia.com/advisories/37949
securitytracker.com/id?1023429
www.redhat.com/support/errata/RHSA-2011-0908.html
www.redhat.com/support/errata/RHSA-2011-0909.html
www.ruby-lang.org/en/news/2010/01/10/webrick-escape-sequence-injection
www.ruby-lang.org/en/news/2010/01/10/webrick-escape-sequence-injection/
www.ruby-lang.org/en/news/2010/08/16/xss-in-webrick-cve-2010-0541/
www.ruby-lang.org/en/news/2011/02/18/exception-methods-can-bypass-safe/
www.ruby-lang.org/en/news/2011/02/18/fileutils-is-vulnerable-to-symlink-race-attacks/
www.securityfocus.com/archive/1/508830/100/0/threaded
www.securityfocus.com/bid/37710
www.ush.it/team/ush/hack_httpd_escape/adv.txt
www.vupen.com/english/advisories/2010/0089
access.redhat.com/errata/RHSA-2011:0909
access.redhat.com/security/updates/classification/#moderate