Published:2006/07/11  Last Updated:2008/05/21

JVN#13947696
Ruby contains a vulnerability that prevents safe level 4 from functioning as a sandbox.

Overview

Safe level is a security model provided by Ruby language that limits the operation of untrusted objects. A vulnerability that allows an attacker to bypass the safe level restrictions and execute inaccessible methods (ex. destructive methods) was confirmed.

Products Affected

  • Ruby 1.8.4-20060516 and earlier Snapshot versions
As a workaround, we recommend that users update to the latest Ruby 1.8.4 snapshot version.

Description

Impact

An attacker may be able to bypass the security model of a server application and change the status of a untained object.

Solution

Vendor Status

Vendor Link
Ruby http://www.ruby-lang.org/ja/

References

JPCERT/CC Addendum

Credit

Akira Tanaka of National Institute of Advanced Industrial Science and Technology (AIST), Japan reported this vulnerability to IPA.
JPCERT/CC coordinated with the vendors under Information Security Early Warning Partnership.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE
JVN iPedia JVNDB-2006-000392

Update History