CVE-2011-2929: Improper Input Validation
(updated )
The template selection functionality in actionpack/lib/action_view/template/resolver.rb in Ruby on Rails 3.0.x before 3.0.10 and 3.1.x before 3.1.0.rc6 does not properly handle glob characters, which allows remote attackers to render arbitrary views via a crafted URL, related to a “filter skipping vulnerability.”
References
- groups.google.com/group/rubyonrails-security/msg/cbbbba6e4f7eaf61?dmode=source&output=gplain
- lists.fedoraproject.org/pipermail/package-announce/2011-September/065109.html
- lists.fedoraproject.org/pipermail/package-announce/2011-September/065212.html
- weblog.rubyonrails.org/2011/8/16/ann-rails-3-1-0-rc6
- www.openwall.com/lists/oss-security/2011/08/17/1
- www.openwall.com/lists/oss-security/2011/08/19/11
- www.openwall.com/lists/oss-security/2011/08/20/1
- www.openwall.com/lists/oss-security/2011/08/22/13
- www.openwall.com/lists/oss-security/2011/08/22/14
- www.openwall.com/lists/oss-security/2011/08/22/5
- bugzilla.redhat.com/show_bug.cgi?id=731432
- github.com/advisories/GHSA-r7q2-5gqg-6c7q
- github.com/rails/rails/commit/5f94b93279f6d0682fafb237c301302c107a9552
- nvd.nist.gov/vuln/detail/CVE-2011-2929
Detect and mitigate CVE-2011-2929 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →