CVE-2011-1005
Published Mar 2, 2011
Last updated 11 years ago
Overview
- Description
- The safe-level feature in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, and 1.8.8dev allows context-dependent attackers to modify strings via the Exception#to_s method, as demonstrated by changing an intended pathname.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-264
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "876B2575-4F81-4A70-9A88-9BEE44649626" }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.6-420:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6AE63237-91FC-45BD-928F-AA428E2FFD95" }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2D86FC99-3521-4E22-8FD3-65CEB05A6342" }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.7-330:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3684A343-ABD7-4B80-993C-1F3CC0F983DF" }, { "criteria": "cpe:2.3:a:ruby-lang:ruby:1.8.8:dev:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3FAFAB6A-3299-4BEE-BDB9-3918DDA5D3DB" } ], "operator": "OR" } ] } ]