GHSA-rvpq-5xqx-pfpp

Suggest an improvement
Source
https://github.com/advisories/GHSA-rvpq-5xqx-pfpp
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2017/10/GHSA-rvpq-5xqx-pfpp/GHSA-rvpq-5xqx-pfpp.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-rvpq-5xqx-pfpp
Aliases
Published
2017-10-24T18:33:38Z
Modified
2024-11-28T05:45:08.147552Z
Summary
Ruby on Rails vulnerable to code injection
Details

Ruby on Rails before 1.1.5 allows remote attackers to execute Ruby code with "severe" or "serious" impact via a File Upload request with an HTTP header that modifies the LOAD_PATH variable, a different vulnerability than CVE-2006-4112.

Database specific
{
    "nvd_published_at": "2006-08-14T21:04:00Z",
    "cwe_ids": [
        "CWE-94"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2020-06-16T21:56:02Z"
}
References

Affected packages

RubyGems / rails

Package

Name
rails
Purl
pkg:gem/rails

Affected ranges

Type
ECOSYSTEM
Events
Introduced
1.1.0
Fixed
1.1.6

Affected versions

1.*

1.1.0
1.1.1
1.1.2
1.1.3
1.1.4
1.1.5