CVE-2019-11879 - Path Traversal vulnerability in Ruby Lang Webrick 1.4.2

Publication

2019-05-10

Last modification

2019-05-13

Summary

** DISPUTED ** The WEBrick gem 1.4.2 for Ruby allows directory traversal if the attacker once had local access to create a symlink to a location outside of the web root directory. NOTE: The vendor states that this is analogous to Options FollowSymlinks in the Apache HTTP Server, and therefore it is "not a problem."

Classification

CWE-22 - Path Traversal

Risk level (CVSS AV:L/AC:L/Au:N/C:P/I:N/A:N)

Low

2.1

Access Vector

  • Network
  • Adjacent Network
  • Local

Access Complexity

  • Low
  • Medium
  • High

Authentication

  • None
  • Single
  • Multiple

Confident. Impact

  • Complete
  • Partial
  • None

Integrity Impact

  • Complete
  • Partial
  • None

Affected Products

Vendor Product Versions
Ruby Lang Webrick  1.4.2