HomeRuby-LangCVE-2021-28966

CVE-2021-28966

HIGH
7.5CVSS
Published: 2021-07-30
Updated: 2024-11-21
AI Analysis

Description

In Ruby through 3.0 on Windows, a remote attacker can submit a crafted path when a Web application handles a parameter with TmpDir.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Attack Vector
network
Complexity
low
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
none
Integrity
high
Availability
none
Weaknesses
CWE-22

Metadata

Primary Vendor
RUBY-LANG
Published
7/30/2021
Last Modified
11/21/2024
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

ruby-lang : rubyruby-lang : ruby

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2021-28966 | HIGH Severity | CVEDatabase.com | CVEDatabase.com