Vulnerability Description
The WEBrick gem 1.4.2 for Ruby allows directory traversal if the attacker once had local access to create a symlink to a location outside of the web root directory. NOTE: The vendor states that this is analogous to Options FollowSymlinks in the Apache HTTP Server, and therefore it is "not a problem.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ruby-Lang | Webrick | 1.4.2 |
Related Weaknesses (CWE)
References
- https://bugs.ruby-lang.org/issues/15835Issue TrackingVendor Advisory
- https://bugs.ruby-lang.org/issues/15835Issue TrackingVendor Advisory
FAQ
What is CVE-2019-11879?
CVE-2019-11879 is a vulnerability with a CVSS score of 5.5 (MEDIUM). The WEBrick gem 1.4.2 for Ruby allows directory traversal if the attacker once had local access to create a symlink to a location outside of the web root directory. NOTE: The vendor states that this i...
How severe is CVE-2019-11879?
CVE-2019-11879 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-11879?
Check the references section above for vendor advisories and patch information. Affected products include: Ruby-Lang Webrick.