CVE-2021-28966: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
(updated )
In Ruby on Windows, a remote attacker can submit a crafted path when a Web application handles a parameter with TmpDir.
References
- github.com/advisories/GHSA-46f2-3v63-3xrp
- github.com/ruby/tmpdir/commit/93798c01cb7c10476e50a4d80130a329ba47f348
- github.com/ruby/tmpdir/pull/8
- github.com/rubysec/ruby-advisory-db/blob/master/gems/tmpdir/CVE-2021-28966.yml
- hackerone.com/reports/1131465
- nvd.nist.gov/vuln/detail/CVE-2021-28966
- rubygems.org/gems/tmpdir
- security.netapp.com/advisory/ntap-20210902-0004/
- www.ruby-lang.org/en/news/2021/04/05/tempfile-path-traversal-on-windows-cve-2021-28966/
Detect and mitigate CVE-2021-28966 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →