National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2008-1891 Detail

Current Description

Directory traversal vulnerability in WEBrick in Ruby 1.8.4 and earlier, 1.8.5 before 1.8.5-p231, 1.8.6 before 1.8.6-p230, 1.8.7 before 1.8.7-p22, and 1.9.0 before 1.9.0-2, when using NTFS or FAT filesystems, allows remote attackers to read arbitrary CGI files via a trailing (1) + (plus), (2) %2b (encoded plus), (3) . (dot), (4) %2e (encoded dot), or (5) %20 (encoded space) character in the URI, possibly related to the WEBrick::HTTPServlet::FileHandler and WEBrick::HTTPServer.new functionality and the :DocumentRoot option.

Source:  MITRE      Last Modified:  04/18/2008      View Analysis Description

Quick Info

CVE Dictionary Entry:
CVE-2008-1891
Original release date:
04/18/2008
Last revised:
08/07/2017
Source:
US-CERT/NIST

Impact

CVSS Severity (version 2.0):
CVSS v2 Base Score:
5.0 MEDIUM
Vector:
(AV:N/AC:L/Au:N/C:P/I:N/A:N) (legend)
Impact Subscore:
2.9
Exploitability Subscore:
10.0
CVSS Version 2 Metrics:
Access Vector:
Network exploitable
Access Complexity:
Low
Authentication:
Not required to exploit
Impact Type:
Allows unauthorized disclosure of information

Vendor Statements (disclaimer)

Official Statement from Red Hat (06/10/2009)

Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2008-1891 The risks associated with fixing this flaw outweigh the benefits of the fix. Red Hat does not plan to fix this flaw in Red Hat Enterprise Linux.

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource Type Source Name
http://aluigi.altervista.org/adv/webrickcgi-adv.txt External Source MISC http://aluigi.altervista.org/adv/webrickcgi-adv.txt
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html External Source SUSE SUSE-SR:2008:017
http://www.mandriva.com/security/advisories?name=MDVSA-2008:140 External Source MANDRIVA MDVSA-2008:140
http://www.mandriva.com/security/advisories?name=MDVSA-2008:141 External Source MANDRIVA MDVSA-2008:141
http://www.ruby-lang.org/en/news/2008/06/20/arbitrary-code-execution-vulnerabilities/ External Source CONFIRM http://www.ruby-lang.org/en/news/2008/06/20/arbitrary-code-execution-vulnerabilities/
http://www.vupen.com/english/advisories/2008/1245/references External Source VUPEN ADV-2008-1245
https://exchange.xforce.ibmcloud.com/vulnerabilities/41824 External Source XF ruby-webrick-cgi-info-disclosure(41824)
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00937.html External Source FEDORA FEDORA-2008-5649

Technical Details

Vulnerability Type (View All)

Change History 2 change records found - show changes