CVE-2006-4111: Ruby on Rails vulnerable to code injection
7.5
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.82375%
CWE
Published
10/24/2017
Updated
11/9/2023
KEV Status
No
Technology
Ruby
Technical Details
CVSS Vector
AV:N/AC:L/Au:N/C:P/I:P/A:P
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
rails | rubygems | >= 1.1.0, < 1.1.6 | 1.1.6 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability centers around improper handling of HTTP headers affecting LOAD_PATH. Key evidence includes:
- The Gentoo advisory explicitly mentions the issue was in action_controller/ components handling user input and LOAD_PATH.
- Historical analysis from presidentbeef/rails-security-history indicates routing layer file loading behavior that could execute arbitrary code.
- The CWE-94 classification confirms code injection via controlled input.
- The Rails 1.1.6 patch would have needed to address how request parameters influence the Ruby environment. The Request#parameters method is central to processing HTTP input in Rails, making it the most likely candidate for the vulnerable path modification logic.