Description
Rails before 1.2.4, as used for Ruby on Rails, allows remote attackers and ActiveResource servers to determine the existence of arbitrary files and read arbitrary XML files via the Hash.from_xml (Hash#from_xml) method, which uses XmlSimple (XML::Simple) unsafely, as demonstrated by reading passwords from the Pidgin (Gaim) .purple/accounts.xml file.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2017-0231 | Moderate severity vulnerability that affects rails |
Github GHSA |
GHSA-fjfg-q662-gm6j | Moderate severity vulnerability that affects rails |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T15:31:59.017Z
Reserved: 2007-10-11T00:00:00.000Z
Link: CVE-2007-5379
No data.
Status : Deferred
Published: 2007-10-19T23:17:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2007-5379
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA