[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id: <200803061128.00490.sflist@digitaloffense.net>
Date: Thu, 6 Mar 2008 11:28:00 -0600
From: H D Moore <sflist@...italoffense.net>
To: bugtraq@...urityfocus.com,
Alexandr Polyakov <alexandr.polyakov@...c.ru>
Cc: vuln@...unia.com, packet@...ketstormsecurity.org
Subject: Re: [DSECRG-08-018] Ruby 1.8.6 (Webrick Httpd 1.3.1) Directory traversal file Download Vulnerability
Hi Alexandr!
I added a "monkey-patch" for this in the Metasploit source tree -- even if
you use Metasploit 3.1 with an unpatched version of Ruby, the patched
handler code is loaded into memory on top of the existing module. Since
the msfweb service will bind to 127.0.0.1 by default, this is not a major
risk, but it seemed prudent to patch it anyways.
The patch was pushed to the Metasploit SVN trees, which are used by the
Online Update functionality in the Windows version. Mac OS X users will
need to change into the Metasploit directory and 'svn update'.
Thanks!
-HD
On Thursday 06 March 2008, Alexandr Polyakov wrote:
> Digital Security Research Group [DSecRG] Advisory #DSECRG-08-018
>
> Application: Ruby 1.8.6 (WEBrick Web server Toolkit
> and applications that used WEBrick, like Metasploit 3.1) Versions
Powered by blists - more mailing lists