Ruby: file creation via IO open
Synthesis of the vulnerability
When an attacker can transmit a special file name to a Ruby application, he can use a special character, in order to force the application to create/open another file.Impacted products:
Fedora, openSUSE, RHEL, Unix (platform).
BID-56115, CVE-2012-4522, FEDORA-2012-16086, openSUSE-SU-2013:0376-1, RHSA-2013:0129-01, VIGILANCE-VUL-12070.
Description of the vulnerability
The Ruby IO#open method is used to open a file, and creates it if it does not exists.
The character '\0' is used as a string terminator in C language. However, in Ruby, a '\0' character is allowed inside a string. This incoherence can lead to errors. For example, if the IO#open method is used to create the file "a\0b", then the system creates the file "a".
When an attacker can transmit a special file name to a Ruby application, he can therefore use a special character, in order to force the application to create/open another file.Complete Vigil@nce bulletin....
Share this bulletin
Computer vulnerabilities tracking service
Vigil@nce provides a systems vulnerabilities management
. The Vigil@nce vulnerability database contains several thousand vulnerabilities. The Vigil@nce security watch publishes vulnerability bulletins about threats impacting the information system. The technology watch team tracks security threats targeting the computer system.