[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248364

 
 

909

 
 

195388

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2011-2929Date: (C)2011-08-29   (M)2023-12-22


The template selection functionality in actionpack/lib/action_view/template/resolver.rb in Ruby on Rails 3.0.x before 3.0.10 and 3.1.x before 3.1.0.rc6 does not properly handle glob characters, which allows remote attackers to render arbitrary views via a crafted URL, related to a "filter skipping vulnerability."

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 5.0
Exploit Score: 10.0
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: NONE
Integrity: PARTIAL
Availability: NONE
  
Reference:
FEDORA-2011-11386
FEDORA-2011-11572
http://www.openwall.com/lists/oss-security/2011/08/17/1
http://www.openwall.com/lists/oss-security/2011/08/19/11
http://www.openwall.com/lists/oss-security/2011/08/20/1
http://www.openwall.com/lists/oss-security/2011/08/22/13
http://groups.google.com/group/rubyonrails-security/msg/cbbbba6e4f7eaf61?dmode=source&output=gplain
http://weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6
https://bugzilla.redhat.com/show_bug.cgi?id=731432
https://github.com/rails/rails/commit/5f94b93279f6d0682fafb237c301302c107a9552

CPE    1
cpe:/a:rubyonrails:ruby_on_rails:3.0.4
CWE    1
CWE-20
OVAL    2
oval:org.secpod.oval:def:103012
oval:org.secpod.oval:def:2495

© SecPod Technologies