Loading HuntDB...

Arbitrary file injection via symlink attack in rdoc generator

None
R
Ruby
Submitted None
Reported by sighook

Vulnerability Details

Technical details and impact analysis

Resource Injection
There is a vulnerability that can allow an attacker to spoof the symbolic link and traverse the file system to unintended locations or access arbitrary files. The symbolic link can permit an attacker to read a file that they originally did not have permissions to access and to inject its content to the placed-on-the-web documentation. # PoC 1. ```sh $ mkdir test $ cd test $ ln -s /etc/passwd test $ rdoc ``` 2. See `doc/test.html` and `doc/js/search_index.js`, they contain the data of `/etc/passwd`. The spoofed link can refer to files in `~/.ssh`, `~/.gnupg`, `/etc`, `/proc`/, `/sys`, thus, the nature of the disclosed data varies from secrets/credentials to system configurations, hardware info, firewall rules, and so on. ## Impact An attacker could gain access to sensitive data or system resources. This could allow access to protected files or directories including configuration files and files containing sensitive information.

Report Details

Additional information and metadata

State

Closed

Substate

Informative

Submitted

Weakness

Resource Injection