[#46725] [ANN] win32oleを活用したExcel操縦用ライブラリ exlap.rb — YOSHIIZUMI <t-yoshiizumi@...>
吉泉です。
6 messages
2010/01/04
[#46732] ヒアドキュメント内の変数展開が正常に行われない — ShingoKintaka <kamuycikap@...>
Ruby :1.8.7 (Ubuntu9.10)
12 messages
2010/01/05
[#46733] Re: ヒアドキュメント内の変数展開が正常に行われない
— rubikitch@...
2010/01/06
From: ShingoKintaka <kamuycikap@tulip.ocn.ne.jp>
[#46739] Re: ヒアドキュメント内の変数展開が正常に行われない
— ShingoKintaka <kamuycikap@...>
2010/01/06
るびきちさん、書き込みありがとうございます。
[#46755] [Security] WEBrick has an Escape Sequence Injection vulnerability — Urabe Shyouhei <shyouhei@...>
WEBrick has an Escape Sequence Injection vulnerability
4 messages
2010/01/10
[#46769] WindowsでGUIなRuby実行ファイルの作り方について — ShingoKintaka <kamuycikap@...>
Windows上(XP/Windows7)で開発したWideStudioアプリケーション(Ruby)につ
7 messages
2010/01/14
[#46770] Re: WindowsでGUIなRuby実行ファイルの作り方について
— ShingoKintaka <kamuycikap@...>
2010/01/14
自己レスです。
[#46771] Re: WindowsでGUIなRuby実行ファイルの作り方について
— H. Shimura <shimura-hir@...>
2010/01/14
dllファイルの同梱
[#46772] google-appengine について — 北村寛 <kitayuta@...>
北村と申します。
5 messages
2010/01/14
[#46779] 動的に生成されるメソッドの命名について — Moru <lateau@...>
44Oi44Or44Go55Sz44GX44G+44GZ44CC5pep6YCf44Gn44GZ44GM5LiA44Gk6LOq5ZWP44GV44Gb
5 messages
2010/01/16
[#46800] DLモジュールの使い方 — kouichi_someya@...
染谷と申します。
12 messages
2010/01/20
[#47678] プログラム実行時に「[BUG] Segmentation fault」
— 染谷 康一 <kouichi_someya@...>
2010/12/09
染谷と申します。
[#47681] Re: プログラム実行時に「[BUG] Segmentation fault」
— "U.Nakamura" <usa@...>
2010/12/10
こんにちは、なかむら(う)です。
[#46803] TkTable.rbで"[BUG] Segmentaion fauilt"発生 — 門脇 修司 <kadowaki.shuji@...>
門脇と申します。
9 messages
2010/01/22
[#46805] Re: TkTable.rbで"[BUG] Segmentaion fauilt"発生
— Hidetoshi NAGAI <nagai@...>
2010/01/24
永井@知能.九工大です.
[#46807] Re: TkTable.rbで"[BUG] Segmentaion fauilt"発生
— 門脇 修司 <kadowaki.shuji@...>
2010/01/25
門脇です。
[#46808] Re: TkTable.rbで"[BUG] Segmentaion fauilt"発生
— Hidetoshi NAGAI <nagai@...>
2010/01/25
永井@知能.九工大です.
[#46810] Re: TkTable.rbで"[BUG] Segmentaion fauilt"発生
— 門脇 修司 <kadowaki.shuji@...>
2010/01/25
門脇です。
[#46829] Exerbでexe化したiconvを使ったスクリプトでエラーが発生する — Nakamatsu Shinji <snaka.gml@...>
Ruby-listの皆さんこんにちは。
6 messages
2010/01/30
[ruby-list:46755] [Security] WEBrick has an Escape Sequence Injection vulnerability
From:
Urabe Shyouhei <shyouhei@...>
Date:
2010-01-10 09:41:08 UTC
List:
ruby-list #46755
WEBrick has an Escape Sequence Injection vulnerability
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D
Synopsis
--------
A vulnerability was found on WEBrick, a part of Ruby's standard library.
WEBrick lets attackers to inject malicious escape sequences to its logs, =
making
it possible for dangerous control characters to be executed on a victim's=
terminal emulator.
We already have a fix for it. Releases for every active branches are to =
follow
this announce. But for a meantime, we recommend you to avoid looking at y=
our
WEBrick logs, until you update your WEBrick process.
Detailed description
--------------------
Terminal escape sequences are used to allow various forms of interaction
between a terminal and a inside process. The problem is that those seque=
nces
are not intended to be issued by untrusted sources; such as network input=
s. So
if a remote attacker could inject escape sequences into WEBrick logs, and=
a
victim happen to consult them through his/her terminal, the attacker coul=
d take
advantages of various weaknesses in terminal emulators[1].
And WEBrick fails to filter those terminal escape sequences.
Example:
% xterm -e ruby -rwebrick -e 'WEBrick::HTTPServer.new(:Port=3D>8080).=
start' &
% wget http://localhost:8080/%1b%5d%32%3b%6f%77%6e%65%64%07%0a
Watch out for the window title of xterm.
Affected versions
-----------------
* Ruby 1.8.6 patchlevel 383 and all prior versions
* Ruby 1.8.7 patchlevel 248 and all prior versions
* Development versions of Ruby 1.8 (1.8.8dev)
* Ruby 1.9.1 patchlevel 376 and all prior versions
* Development versions of Ruby 1.9 (1.9.2dev)
Solutions
---------
* Fixes for 1.8.6, 1.8.7, and 1.9.1 are to follow this announce.
* For development versions, please update to the most recent revision for=
each
development branch.
Credit
------
Credit to Giovanni "evilaliv3" Pellerano, Alessandro "jekil" Tanasi, and
Francesco "ascii" Ongaro for discovering this vulnerability.
[1] http://marc.info/?l=3Dbugtraq&m=3D104612710031920&w=3D2
"Terminal Emulator Security Issues"
Attachments (1)
signature.asc
(260 Bytes, application/pgp-signature)