GHSA-6mq2-37j5-w6r6

Suggest an improvement
Source
https://github.com/advisories/GHSA-6mq2-37j5-w6r6
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2017/10/GHSA-6mq2-37j5-w6r6/GHSA-6mq2-37j5-w6r6.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-6mq2-37j5-w6r6
Aliases
  • CVE-2009-4492
Published
2017-10-24T18:33:38Z
Modified
2024-11-30T05:42:07.535558Z
Summary
WEBrick Improper Input Validation vulnerability
Details

WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.

Database specific
{
    "nvd_published_at": "2010-01-13T20:30:00Z",
    "cwe_ids": [
        "CWE-20"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2020-06-16T21:19:44Z"
}
References

Affected packages

RubyGems / webrick

Package

Name
webrick
Purl
pkg:gem/webrick

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.4.0

Affected versions

1.*

1.3.1
1.4.0.beta1

Database specific

{
    "last_known_affected_version_range": "<= 1.3.1"
}