{"id":"CVE-2006-4111","details":"Ruby on Rails before 1.1.5 allows remote attackers to execute Ruby code with \"severe\" or \"serious\" impact via a File Upload request with an HTTP header that modifies the LOAD_PATH variable, a different vulnerability than CVE-2006-4112.","aliases":["GHSA-rvpq-5xqx-pfpp"],"modified":"2026-04-10T03:38:30.944435Z","published":"2006-08-14T21:04:00Z","references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/21466"},{"type":"ADVISORY","url":"http://secunia.com/advisories/21749"},{"type":"ADVISORY","url":"http://www.gentoo.org/security/en/glsa/glsa-200608-20.xml"},{"type":"ADVISORY","url":"http://www.novell.com/linux/security/advisories/2006_21_sr.html"},{"type":"ADVISORY","url":"http://www.vupen.com/english/advisories/2006/3237"},{"type":"FIX","url":"http://blog.koehntopp.de/archives/1367-Ruby-On-Rails-Mandatory-Mystery-Patch.html"},{"type":"FIX","url":"http://weblog.rubyonrails.org/2006/8/9/rails-1-1-5-mandatory-security-patch-and-other-tidbits"},{"type":"FIX","url":"http://www.gentoo.org/security/en/glsa/glsa-200608-20.xml"},{"type":"FIX","url":"http://www.securityfocus.com/bid/19454"},{"type":"WEB","url":"http://securitytracker.com/id?1016673"}],"schema_version":"1.7.5"}