CVE-2006-4112: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
(updated )
Unspecified vulnerability in the “dependency resolution mechanism” in Ruby on Rails 1.1.0 through 1.1.5 allows remote attackers to execute arbitrary Ruby code via a URL that is not properly handled in the routing code, which leads to a denial of service (application hang) or “data loss,” a different vulnerability than CVE-2006-4111.
References
- secunia.com/advisories/21424
- secunia.com/advisories/21466
- secunia.com/advisories/21749
- securitytracker.com/id?1016673
- weblog.rubyonrails.org/2006/8/10/rails-1-1-6-backports-and-full-disclosure
- www.gentoo.org/security/en/glsa/glsa-200608-20.xml
- www.kb.cert.org/vuls/id/699540
- www.novell.com/linux/security/advisories/2006_21_sr.html
- www.securityfocus.com/archive/1/442934/100/0/threaded
- www.securityfocus.com/bid/19454
- exchange.xforce.ibmcloud.com/vulnerabilities/28364
- github.com/advisories/GHSA-9wrq-xvmp-xjc8
- nvd.nist.gov/vuln/detail/CVE-2006-4112
Detect and mitigate CVE-2006-4112 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →