Unspecified vulnerability in the "dependency resolution mechanism" in Ruby on Rails 1.1.0 through 1.1.5 allows remote attackers to execute arbitrary Ruby code via a URL that is not properly handled in the routing code, which leads to a denial of service (application hang) or "data loss," a different vulnerability than CVE-2006-4111.
References
Link | Resource |
---|---|
http://weblog.rubyonrails.org/2006/8/10/rails-1-1-6-backports-and-full-disclosure | Patch |
http://www.gentoo.org/security/en/glsa/glsa-200608-20.xml | Patch Vendor Advisory |
http://www.kb.cert.org/vuls/id/699540 | Patch US Government Resource |
http://www.securityfocus.com/bid/19454 | Patch |
http://secunia.com/advisories/21424 | Patch Vendor Advisory |
http://secunia.com/advisories/21466 | Vendor Advisory |
http://securitytracker.com/id?1016673 | |
http://www.novell.com/linux/security/advisories/2006_21_sr.html | |
http://secunia.com/advisories/21749 | Vendor Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/28364 | |
http://www.securityfocus.com/archive/1/442934/100/0/threaded |
Configurations
Configuration 1 (hide)
|
Information
Published : 2006-08-14 14:04
Updated : 2019-08-08 07:38
NVD link : CVE-2006-4112
Mitre link : CVE-2006-4112
JSON object : View
CWE
Products Affected
rubyonrails
- rails