{"id":"CVE-2006-4112","details":"Unspecified vulnerability in the \"dependency resolution mechanism\" in Ruby on Rails 1.1.0 through 1.1.5 allows remote attackers to execute arbitrary Ruby code via a URL that is not properly handled in the routing code, which leads to a denial of service (application hang) or \"data loss,\" a different vulnerability than CVE-2006-4111.","aliases":["GHSA-9wrq-xvmp-xjc8"],"modified":"2026-04-10T03:37:44.145948Z","published":"2006-08-14T21:04:00Z","references":[{"type":"ADVISORY","url":"http://secunia.com/advisories/21424"},{"type":"ADVISORY","url":"http://secunia.com/advisories/21466"},{"type":"ADVISORY","url":"http://secunia.com/advisories/21749"},{"type":"ADVISORY","url":"http://www.gentoo.org/security/en/glsa/glsa-200608-20.xml"},{"type":"ADVISORY","url":"http://www.novell.com/linux/security/advisories/2006_21_sr.html"},{"type":"FIX","url":"http://secunia.com/advisories/21424"},{"type":"FIX","url":"http://weblog.rubyonrails.org/2006/8/10/rails-1-1-6-backports-and-full-disclosure"},{"type":"FIX","url":"http://www.gentoo.org/security/en/glsa/glsa-200608-20.xml"},{"type":"FIX","url":"http://www.kb.cert.org/vuls/id/699540"},{"type":"FIX","url":"http://www.securityfocus.com/bid/19454"},{"type":"WEB","url":"http://securitytracker.com/id?1016673"},{"type":"WEB","url":"http://www.kb.cert.org/vuls/id/699540"},{"type":"WEB","url":"http://www.securityfocus.com/archive/1/442934/100/0/threaded"},{"type":"WEB","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/28364"}],"schema_version":"1.7.5"}