CVE-2011-1004Link Following in Ruby

CWE-59Link Following8 documents6 sources
Severity
6.3MEDIUMNVD
EPSS
0.0%
top 86.61%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMar 2
Latest updateMay 17

Description

The FileUtils.remove_entry_secure method in Ruby 1.8.6 through 1.8.6-420, 1.8.7 through 1.8.7-330, 1.8.8dev, 1.9.1 through 1.9.1-430, 1.9.2 through 1.9.2-136, and 1.9.3dev allows local users to delete arbitrary files via a symlink attack.

CVSS vector

AV:L/AC:M/C:N/I:C/A:CExploitability: 3.4 | Impact: 9.2

Affected Packages1 packages

NVDruby-lang/ruby6 versions+5

Patches

🔴Vulnerability Details

2
GHSA
GHSA-45wv-gc6w-fq7m: The FileUtils2022-05-17
CVEList
CVE-2011-1004: The FileUtils2011-03-02

📋Vendor Advisories

2
Ubuntu
Ruby vulnerabilities2012-02-28
Red Hat
Ruby: Symlink race condition by removing directory trees in fileutils module2011-02-18

💬Community

2
Bugzilla
CVE-2011-1167 libtiff: heap-based buffer overflow in thunder decoder (ZDI-CAN-1004) [fedora-all]2011-03-21
Bugzilla
CVE-2011-1004 Ruby: Symlink race condition by removing directory trees in fileutils module2011-02-20
CVE-2011-1004 — Link Following in Ruby-lang Ruby | cvebase