Rails before 1.2.4, as used for Ruby on Rails, allows remote attackers and ActiveResource servers to determine the existence of arbitrary files and read arbitrary XML files via the Hash.from_xml (Hash#from_xml) method, which uses XmlSimple (XML::Simple) unsafely, as demonstrated by reading passwords from the Pidgin (Gaim) .purple/accounts.xml file.
References
Configurations
Information
Published : 2007-10-19 16:17
Updated : 2012-10-30 19:44
NVD link : CVE-2007-5379
Mitre link : CVE-2007-5379
JSON object : View
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
Products Affected
david_hansson
- ruby_on_rails