CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
EPSS
Percentile
91.7%
Ruby includes a vulnerable default value that may be used to bypass security restrictions and execute arbitrary code.
Ruby is vulnerable to an attack on applications using the XML-RPC services via XMLRPC.iPIMethods, due to an insecure default value in utils.rb
. Any program or application using the XML-RPC services provided by XMLRPC.iPIMethods may be affected. Due to the vulnerability occurring in code that is typically used to provide remote services, this may allow a remote attacker to execute arbitrary code.
A remote, unauthenticated attacker may be able to execute arbitrary code.
Apply an update
Please see the Ruby XMLRPC.iPIMethods Vulnerability note for more information, or contact your vendor for an update.
684913
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: October 18, 2005
Affected
This issue did not affect the Ruby packages in Red Hat Enterprise Linux 2.1, or 3.
Updated Ruby packages for Red Hat Enterprise Linux 4 to correct this issue are available at the URL below and by using the Red Hat Network ‘up2date’ tool.
<http://rhn.redhat.com/errata/RHSA-2005-543.html>
The vendor has not provided us with any further information regarding this vulnerability.
Updated: October 03, 2005
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Please see the Ruby XMLRPC.iPIMethods Vulnerability note for more information.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23684913 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
Thanks to Nobuhiro IMAI for reporting this vulnerability.
This document was written by Ken MacInnis.
CVE IDs: | CVE-2005-1992 |
---|---|
Severity Metric: | 9.11 Date Public: |