Rails before 1.2.4, as used for Ruby on Rails, allows remote attackers and ActiveResource servers to determine the existence of arbitrary files and read arbitrary XML files via the Hash.from_xml (Hash#from_xml) method, which uses XmlSimple (XML::Simple) unsafely, as demonstrated by reading passwords from the Pidgin (Gaim) .purple/accounts.xml file.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2007-10-19T23:00:00
Updated: 2024-08-07T15:31:59.017Z
Reserved: 2007-10-11T00:00:00
Link: CVE-2007-5379
Vulnrichment
No data.
NVD
Status : Modified
Published: 2007-10-19T23:17:00.000
Modified: 2024-11-21T00:37:45.760
Link: CVE-2007-5379
Redhat
No data.