Lucene search

K
cve[email protected]CVE-2007-5379
HistoryOct 19, 2007 - 11:17 p.m.

CVE-2007-5379

2007-10-1923:17:00
CWE-200
web.nvd.nist.gov
61
rails
ruby on rails
cve-2007-5379
xml security
file access vulnerability

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

9.3 High

AI Score

Confidence

High

0.009 Low

EPSS

Percentile

82.5%

Rails before 1.2.4, as used for Ruby on Rails, allows remote attackers and ActiveResource servers to determine the existence of arbitrary files and read arbitrary XML files via the Hash.from_xml (Hash#from_xml) method, which uses XmlSimple (XML::Simple) unsafely, as demonstrated by reading passwords from the Pidgin (Gaim) .purple/accounts.xml file.

Affected configurations

NVD
Node
david_hanssonruby_on_railsRange1.2.3

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

9.3 High

AI Score

Confidence

High

0.009 Low

EPSS

Percentile

82.5%