CVE-2019-11879

** DISPUTED ** The WEBrick gem 1.4.2 for Ruby allows directory traversal if the attacker once had local access to create a symlink to a location outside of the web root directory. NOTE: The vendor states that this is analogous to Options FollowSymlinks in the Apache HTTP Server, and therefore it is "not a problem."
References
Link Resource
https://bugs.ruby-lang.org/issues/15835 Issue Tracking Vendor Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

cpe:2.3:a:ruby-lang:webrick:1.4.2:*:*:*:*:ruby:*:*

Information

Published : 2019-05-10 09:29

Updated : 2020-08-24 10:37


NVD link : CVE-2019-11879

Mitre link : CVE-2019-11879


JSON object : View

CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

CWE-59

Improper Link Resolution Before File Access ('Link Following')

Advertisement

dedicated server usa

Products Affected

ruby-lang

  • webrick