logo

CVE-2007-5379 rails

Package

Manager: gem
Name: rails
Vulnerable Version: >=0 <1.2.4

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.10003 pctl0.92769

Details

Moderate severity vulnerability that affects rails Rails before 1.2.4, as used for Ruby on Rails, allows remote attackers and ActiveResource servers to determine the existence of arbitrary files and read arbitrary XML files via the Hash.from_xml (Hash#from_xml) method, which uses XmlSimple (XML::Simple) unsafely, as demonstrated by reading passwords from the Pidgin (Gaim) .purple/accounts.xml file.

Metadata

Created: 2017-10-24T18:33:38Z
Modified: 2025-05-01T18:12:56Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2017/10/GHSA-fjfg-q662-gm6j/GHSA-fjfg-q662-gm6j.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-fjfg-q662-gm6j
Finding: F308
Auto approve: 1