SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Ruby Vendors:   Matsumoto, Yukihiro
(Apple Issues Fix) Ruby WEBrick Server Input Validation Flaw in Error Pages Permits Cross-Site Scripting Attacks
SecurityTracker Alert ID:  1024106
SecurityTracker URL:  http://securitytracker.com/id/1024106
CVE Reference:   CVE-2010-0541   (Links to External Site)
Date:  Jun 16 2010
Impact:   Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  

Description:   A vulnerability was reported in the Ruby WEBrick server. A remote user can conduct cross-site scripting attacks.

The Ruby WEBrick HTTP server error pages do not properly filter HTML code from user-supplied input before displaying the input. A remote user can create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the Ruby software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

Apple reported this vulnerability.

Impact:   A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the Ruby software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
Solution:   The vendor has issued a fix as part of Security Update 2010-004 / Mac OS X v10.6.4, available from the Software Update pane in System Preferences, or Apple's Software Downloads web site at:

http://www.apple.com/support/downloads/

The Software Update utility will present the update that applies to your system configuration. Only one is needed, either Security Update 2010-004 or Mac OS X v10.6.4.

For Mac OS X v10.6.3
The download file is named: MacOSXUpd10.6.4.dmg
Its SHA-1 digest is: e306451e458701dbbc0268bec87239f5490ec832

For Mac OS X v10.6 - v10.6.2
The download file is named: MacOSXUpdCombo10.6.4.dmg
Its SHA-1 digest is: b7ea3ebe1d0a98dfdc4cb107cb7127f5ac2cdb96

For Mac OS X Server v10.6.3
The download file is named: MacOSXServerUpd10.6.4.dmg
Its SHA-1 digest is: 7688a1a3d77b23ce142038ff295d868e37f79872

For Mac OS X Server v10.6 - v10.6.2
The download file is named: MacOSXServUpdCombo10.6.4.dmg
Its SHA-1 digest is: dd38a7d63a4383e608da99ffcf70e6dc213082b3

For Mac OS X v10.5.8
The download file is named: SecUpd2010-004.dmg
Its SHA-1 digest is: 0555958e44a52a447e4fd67469299f0d35286a8a

For Mac OS X Server v10.5.8
The download file is named: SecUpdSrvr2010-004.dmg
Its SHA-1 digest is: 222d512a8c0de61fcb9d9a130d660bb5a52e6402

The vendor's advisory is available at:

http://support.apple.com/kb/HT4188

Vendor URL:  www.ruby-lang.org/en/news/2010/08/16/xss-in-webrick-cve-2010-0541/ (Links to External Site)
Cause:   Input validation error
Underlying OS:  UNIX (macOS/OS X)

Message History:   This archive entry is a follow-up to the message listed below.
Jun 16 2010 Ruby WEBrick Server Input Validation Flaw in Error Pages Permits Cross-Site Scripting Attacks



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC