Directory Traversal Vulnerability in Ruby by Ruby.org
CVE-2018-8780

9.1CRITICAL

Key Information:

Vendor

Ruby-lang

Status
Vendor
CVE Published:
3 April 2018

What is CVE-2018-8780?

A vulnerability in Ruby prior to the specified versions allows malicious users to exploit unvalidated input. The Dir.open, Dir.new, Dir.entries, and Dir.empty? methods fail to discard NULL characters, potentially leading to unintended directory traversal actions. This oversight can expose sensitive file content to unauthorized parties, making it crucial for developers to update to the latest Ruby versions to safeguard their applications against these risks.

References

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.