Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXd3bWYtNnA1OC02dmoy
Remote code execution in rwiki
The editing form in RWiki 2.1.0pre1 through 2.1.0 allows remote attackers to execute arbitrary Ruby code via unknown attack vectors.
Permalink: https://github.com/advisories/GHSA-wwmf-6p58-6vj2JSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLXd3bWYtNnA1OC02dmoy
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: about 7 years ago
Updated: about 1 year ago
EPSS Percentage: 0.01059
EPSS Percentile: 0.83884
Identifiers: GHSA-wwmf-6p58-6vj2, CVE-2006-2582
References:
- https://nvd.nist.gov/vuln/detail/CVE-2006-2582
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26668
- https://github.com/advisories/GHSA-wwmf-6p58-6vj2
- http://secunia.com/advisories/20264
- http://www.vupen.com/english/advisories/2006/1949
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rwiki/CVE-2006-2582.yml
- https://web.archive.org/web/20090501134922/http://www2a.biglobe.ne.jp/~seki/ruby/rwiki.html
Affected Packages
rubygems:rwiki
Dependent packages: 0Dependent repositories: 1
Downloads: 20,982 total
Affected Version Ranges: >= 2.1.0pre1, < 2.1.1
Fixed in: 2.1.1
All affected versions:
All unaffected versions: 0.1.3, 0.2.1, 0.2.2, 0.2.3, 0.2.4, 0.2.5