| Name | CVE-2013-0262 |
| Description | rack/file.rb (Rack::File) in Rack 1.5.x before 1.5.2 and 1.4.x before 1.4.5 allows attackers to access arbitrary files outside the intended root directory via a crafted PATH_INFO environment variable, probably a directory traversal vulnerability that is remotely exploitable, aka "symlink path traversals." |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
| Debian Bugs | 700173 |
Vulnerable and fixed packages
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|
| ruby-rack (PTS) | bullseye | 2.1.4-3+deb11u2 | fixed |
| bullseye (security) | 2.1.4-3+deb11u4 | fixed |
| bookworm | 2.2.13-1~deb12u1 | fixed |
| bookworm (security) | 2.2.20-0+deb12u1 | fixed |
| trixie | 3.1.16-0.1 | fixed |
| trixie (security) | 3.1.18-1~deb13u1 | fixed |
| forky, sid | 3.1.18-1 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|
| librack-ruby | source | (unstable) | (not affected) | | | |
| ruby-rack | source | (unstable) | 1.4.1-2.1 | | | 700173 |
Notes
- librack-ruby <not-affected> (Introduced in 1.4.0, see #700226)
Patches in git, commit 6f237e4c9fab649d3750482514f0fde76c56ab30