ruby: bypass object flags
| Package(s): | ruby1.8 |
CVE #(s): | CAN-2005-2337
|
| Created: | October 10, 2005 |
Updated: | October 21, 2005 |
| Description: |
The object oriented scripting language Ruby supports safely executing
untrusted code with two mechanisms: safe level and taint flag on
objects. Dr. Yutaka Oiwa discovered a vulnerability that allows
Ruby methods to bypass these mechanisms. In systems which use this
feature, this could be exploited to execute Ruby code beyond the
restrictions specified in each safe level. |
| Alerts: |
|