CVE-2011-2929
29.08.2011, 18:55
The template selection functionality in actionpack/lib/action_view/template/resolver.rb in Ruby on Rails 3.0.x before 3.0.10 and 3.1.x before 3.1.0.rc6 does not properly handle glob characters, which allows remote attackers to render arbitrary views via a crafted URL, related to a "filter skipping vulnerability."Enginsight
Vendor | Product | Version |
---|---|---|
rubyonrails | rails | 3.0.0 |
rubyonrails | rails | 3.0.0:beta |
rubyonrails | rails | 3.0.0:beta2 |
rubyonrails | rails | 3.0.0:beta3 |
rubyonrails | rails | 3.0.0:beta4 |
rubyonrails | rails | 3.0.0:rc |
rubyonrails | rails | 3.0.0:rc2 |
rubyonrails | rails | 3.0.1 |
rubyonrails | rails | 3.0.1:pre |
rubyonrails | rails | 3.0.2 |
rubyonrails | rails | 3.0.2:pre |
rubyonrails | rails | 3.0.3 |
rubyonrails | rails | 3.0.4:rc1 |
rubyonrails | rails | 3.0.5 |
rubyonrails | rails | 3.0.5:rc1 |
rubyonrails | rails | 3.0.6 |
rubyonrails | rails | 3.0.6:rc1 |
rubyonrails | rails | 3.0.6:rc2 |
rubyonrails | rails | 3.0.7 |
rubyonrails | rails | 3.0.7:rc1 |
rubyonrails | rails | 3.0.7:rc2 |
rubyonrails | rails | 3.0.8 |
rubyonrails | rails | 3.0.8:rc1 |
rubyonrails | rails | 3.0.8:rc2 |
rubyonrails | rails | 3.0.8:rc3 |
rubyonrails | rails | 3.0.8:rc4 |
rubyonrails | rails | 3.0.9 |
rubyonrails | rails | 3.0.9:rc1 |
rubyonrails | rails | 3.0.9:rc2 |
rubyonrails | rails | 3.0.9:rc3 |
rubyonrails | rails | 3.0.9:rc4 |
rubyonrails | rails | 3.0.9:rc5 |
rubyonrails | rails | 3.0.10:rc1 |
rubyonrails | ruby_on_rails | 3.0.4 |
rubyonrails | rails | 3.1.0 |
rubyonrails | rails | 3.1.0:beta1 |
rubyonrails | rails | 3.1.0:rc1 |
rubyonrails | rails | 3.1.0:rc2 |
rubyonrails | rails | 3.1.0:rc3 |
rubyonrails | rails | 3.1.0:rc4 |
rubyonrails | rails | 3.1.0:rc5 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Common Weakness Enumeration
References