CVE-2006-4111: Improper Control of Generation of Code ('Code Injection')
(updated )
Ruby on Rails before 1.1.5 allows remote attackers to execute Ruby code with “severe” or “serious” impact via a File Upload request with an HTTP header that modifies the LOAD_PATH variable, a different vulnerability than CVE-2006-4112.
References
- blog.koehntopp.de/archives/1367-Ruby-On-Rails-Mandatory-Mystery-Patch.html
- secunia.com/advisories/21466
- secunia.com/advisories/21749
- securitytracker.com/id?1016673
- weblog.rubyonrails.org/2006/8/9/rails-1-1-5-mandatory-security-patch-and-other-tidbits
- www.gentoo.org/security/en/glsa/glsa-200608-20.xml
- www.novell.com/linux/security/advisories/2006_21_sr.html
- www.securityfocus.com/bid/19454
- www.vupen.com/english/advisories/2006/3237
- github.com/advisories/GHSA-rvpq-5xqx-pfpp
- nvd.nist.gov/vuln/detail/CVE-2006-4111
Detect and mitigate CVE-2006-4111 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →