Show filters
104 Total Results
Displaying 21-30 of 104
Sort by:
Attacker Value
Unknown
CVE-2020-5247
Disclosure Date: February 28, 2020 (last updated February 21, 2025)
In Puma (RubyGem) before 4.3.2 and before 3.12.3, if an application using Puma allows untrusted input in a response header, an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content, such as additional headers or an entirely new response body. This vulnerability is known as HTTP Response Splitting. While not an attack in itself, response splitting is a vector for several other attacks, such as cross-site scripting (XSS). This is related to CVE-2019-16254, which fixed this vulnerability for the WEBrick Ruby web server. This has been fixed in versions 4.3.2 and 3.12.3 by checking all headers for line endings and rejecting headers with those characters.
0
Attacker Value
Unknown
CVE-2020-8130
Disclosure Date: February 24, 2020 (last updated February 21, 2025)
There is an OS command injection vulnerability in Ruby Rake < 12.3.3 in Rake::FileList when supplying a filename that begins with the pipe character `|`.
0
Attacker Value
Unknown
CVE-2015-1855
Disclosure Date: November 29, 2019 (last updated November 27, 2024)
verify_certificate_identity in the OpenSSL extension in Ruby before 2.0.0 patchlevel 645, 2.1.x before 2.1.6, and 2.2.x before 2.2.2 does not properly validate hostnames, which allows remote attackers to spoof servers via vectors related to (1) multiple wildcards, (1) wildcards in IDNA names, (3) case sensitivity, and (4) non-ASCII characters.
0
Attacker Value
Unknown
CVE-2019-16254
Disclosure Date: November 26, 2019 (last updated November 27, 2024)
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF.
0
Attacker Value
Unknown
CVE-2019-15845
Disclosure Date: November 26, 2019 (last updated November 27, 2024)
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 mishandles path checking within File.fnmatch functions.
0
Attacker Value
Unknown
CVE-2011-4121
Disclosure Date: November 26, 2019 (last updated November 27, 2024)
The OpenSSL extension of Ruby (Git trunk) versions after 2011-09-01 up to 2011-11-03 always generated an exponent value of '1' to be used for private RSA key generation. A remote attacker could use this flaw to bypass or corrupt integrity of services, depending on strong private RSA keys generation mechanism.
0
Attacker Value
Unknown
CVE-2011-3624
Disclosure Date: November 26, 2019 (last updated November 27, 2024)
Various methods in WEBrick::HTTPRequest in Ruby 1.9.2 and 1.8.7 and earlier do not validate the X-Forwarded-For, X-Forwarded-Host and X-Forwarded-Server headers in requests, which might allow remote attackers to inject arbitrary text into log files or bypass intended address parsing via a crafted header.
0
Attacker Value
Unknown
CVE-2013-1945
Disclosure Date: October 31, 2019 (last updated November 27, 2024)
ruby193 uses an insecure LD_LIBRARY_PATH setting.
0
Attacker Value
Unknown
CVE-2019-16201
Disclosure Date: June 27, 2019 (last updated November 27, 2024)
WEBrick::HTTPAuth::DigestAuth in Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 has a regular expression Denial of Service cause by looping/backtracking. A victim must expose a WEBrick server that uses DigestAuth to the Internet or a untrusted network.
0
Attacker Value
Unknown
CVE-2019-16255
Disclosure Date: June 20, 2019 (last updated November 27, 2024)
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows code injection if the first argument (aka the "command" argument) to Shell#[] or Shell#test in lib/shell.rb is untrusted data. An attacker can exploit this to call an arbitrary Ruby method.
0