Description
WEBrick 1.3.1 in Ruby 1.8.6 through patchlevel 383, 1.8.7 through patchlevel 248, 1.8.8dev, 1.9.1 through patchlevel 376, and 1.9.2dev writes data to a log file without sanitizing non-printable characters, which might allow remote attackers to modify a window's title, or possibly execute arbitrary commands or overwrite files, via an HTTP request containing an escape sequence for a terminal emulator.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-6mq2-37j5-w6r6 | WEBrick Improper Input Validation vulnerability |
Ubuntu USN |
USN-900-1 | Ruby vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T07:01:20.327Z
Reserved: 2009-12-30T00:00:00.000Z
Link: CVE-2009-4492
No data.
Status : Modified
Published: 2010-01-13T20:30:00.530
Modified: 2026-04-23T00:35:47.467
Link: CVE-2009-4492
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA
Ubuntu USN