JVN#13947696
Ruby contains a vulnerability that prevents safe level 4 from functioning as a sandbox.
Overview
Safe level is a security model provided by Ruby language that limits the operation of untrusted objects. A vulnerability that allows an attacker to bypass the safe level restrictions and execute inaccessible methods (ex. destructive methods) was confirmed.
Products Affected
- Ruby 1.8.4-20060516 and earlier Snapshot versions
Description
Impact
An attacker may be able to bypass the security model of a server application and change the status of a untained object.
Solution
Vendor Status
| Vendor | Link |
| Ruby |
http://www.ruby-lang.org/ja/ |
References
JPCERT/CC Addendum
Credit
Akira Tanaka of National Institute of Advanced Industrial Science and Technology (AIST), Japan reported this vulnerability to IPA.
JPCERT/CC coordinated with the vendors under Information Security Early Warning Partnership.
Other Information
| JPCERT Alert | |
| JPCERT Reports | |
| CERT Advisory | |
| CPNI Advisory | |
| TRnotes | |
| CVE | |
| JVN iPedia |
JVNDB-2006-000392 |