Directory traversal vulnerability in WEBrick in Ruby 1.8 before 1.8.5-p115 and 1.8.6-p114, and 1.9 through 1.9.0-1, when running on systems that support backslash (\) path separators or case-insensitive file names, allows remote attackers to access arbitrary files via (1) "..%5c" (encoded backslash) sequences or (2) filenames that match patterns in the :NondisclosureName option.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T08:08:57.740Z
Reserved: 2008-03-04T00:00:00
Link: CVE-2008-1145

No data.

Status : Modified
Published: 2008-03-04T23:44:00.000
Modified: 2024-11-21T00:43:46.980
Link: CVE-2008-1145
