Description
Ruby on Rails before 1.1.5 allows remote attackers to execute Ruby code with "severe" or "serious" impact via a File Upload request with an HTTP header that modifies the LOAD_PATH variable, a different vulnerability than CVE-2006-4112.
Exploits
No known exploits found for this CVE.
Search Exploit-DBReferences
cve@mitre.org
http://secunia.com/advisories/21466cve@mitre.org
http://secunia.com/advisories/21749cve@mitre.org
http://securitytracker.com/id?1016673cve@mitre.org
http://weblog.rubyonrails.org/2006/8/9/rails-1-1-5-mandatory-security-patch-and-other-tidbitscve@mitre.org
http://www.securityfocus.com/bid/19454cve@mitre.org
http://www.vupen.com/english/advisories/2006/3237af854a3a-2127-422b-91ae-364da2661108
http://blog.koehntopp.de/archives/1367-Ruby-On-Rails-Mandatory-Mystery-Patch.htmlaf854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/21466af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/21749af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1016673af854a3a-2127-422b-91ae-364da2661108
http://weblog.rubyonrails.org/2006/8/9/rails-1-1-5-mandatory-security-patch-and-other-tidbitsaf854a3a-2127-422b-91ae-364da2661108
http://www.gentoo.org/security/en/glsa/glsa-200608-20.xmlaf854a3a-2127-422b-91ae-364da2661108
http://www.novell.com/linux/security/advisories/2006_21_sr.htmlaf854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/19454af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/3237