{"vuid":"VU#684913","idnumber":"684913","name":"Ruby library contains vulnerable default value","keywords":["Ruby","library","utils.rb","vulnerable default value","arbitrary command execution","XMLRPC module"],"overview":"Ruby includes a vulnerable default value that may be used to bypass security restrictions and execute arbitrary code.","clean_desc":"Ruby is vulnerable to an attack on applications using the XML-RPC services via XMLRPC.iPIMethods, due to an insecure default value in utils.rb. Any program or application using the XML-RPC services provided by XMLRPC.iPIMethods may be affected. Due to the vulnerability occurring in code that is typically used to provide remote services, this may allow a remote attacker to execute arbitrary code.","impact":"A remote, unauthenticated attacker may be able to execute arbitrary code.","resolution":"Apply an update\nPlease see the Ruby XMLRPC.iPIMethods Vulnerability note for more information, or contact your vendor for an update.","workarounds":"","sysaffected":"","thanks":"Thanks to Nobuhiro IMAI for reporting this vulnerability.","author":"This document was written by Ken MacInnis.","public":["http://secunia.com/advisories/15767/","http://blade.nagaokaut.ac.jp/cgi-bin/scat.rb/ruby/ruby-core/5237","http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=315064","http://www.securityfocus.com/bid/14016","https://rhn.redhat.com/errata/RHSA-2005-543.html","http://www.auscert.org.au/5356","http://www.auscert.org.au/5509"],"cveids":["CVE-2005-1992"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-06-22T20:11:54Z","publicdate":"2005-06-20T00:00:00Z","datefirstpublished":"2005-10-03T19:18:53Z","dateupdated":"2005-10-18T14:44:29Z","revision":19,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"9","cam_impact":"18","cam_easeofexploitation":"10","cam_attackeraccessrequired":"15","cam_scorecurrent":"9.1125","cam_scorecurrentwidelyknown":"11.390625","cam_scorecurrentwidelyknownexploited":"20.503125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":9.1125,"vulnote":null}