Description
The WEBrick gem 1.4.2 for Ruby allows directory traversal if the attacker once had local access to create a symlink to a location outside of the web root directory. NOTE: The vendor states that this is analogous to Options FollowSymlinks in the Apache HTTP Server, and therefore it is "not a problem.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
| Link | Providers |
|---|---|
| https://bugs.ruby-lang.org/issues/15835 |
|
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T23:03:32.832Z
Reserved: 2019-05-10T00:00:00.000Z
Link: CVE-2019-11879
No data.
Status : Modified
Published: 2019-05-10T16:29:01.737
Modified: 2024-11-21T04:21:56.713
Link: CVE-2019-11879
No data.
OpenCVE Enrichment
No data.