The WEBrick gem 1.4.2 for Ruby allows directory traversal if the attacker once had local access to create a symlink to a location outside of the web root directory. NOTE: The vendor states that this is analogous to Options FollowSymlinks in the Apache HTTP Server, and therefore it is "not a problem.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://bugs.ruby-lang.org/issues/15835 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T23:03:32.832Z
Reserved: 2019-05-10T00:00:00
Link: CVE-2019-11879

No data.

Status : Modified
Published: 2019-05-10T16:29:01.737
Modified: 2024-11-21T04:21:56.713
Link: CVE-2019-11879

No data.