Advisory Database
  • Advisories
  • Dependency Scanning
  1. gem
  2. ›
  3. rack
  4. ›
  5. CVE-2013-0262

CVE-2013-0262: Symlink path traversal in Rack::File

February 8, 2013 (updated August 13, 2018)

Affected versions allows attackers to access arbitrary files outside the intended root directory via a crafted PATH_INFO environment variable, probably a directory traversal vulnerability that is remotely exploitable, aka “symlink path traversals.”

References

  • rack.github.com/

Code Behaviors & Features

Detect and mitigate CVE-2013-0262 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 1.4.0 before 1.4.5, all versions starting from 1.5.0 before 1.5.2

Fixed versions

  • 1.4.5
  • 1.5.2

Solution

Upgrade

Impact 4.3 MEDIUM

AV:N/AC:M/Au:N/C:P/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Source file

gem/rack/CVE-2013-0262.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 13 May 2025 12:15:21 +0000.