CVE-2007-5379

Source
https://cve.org/CVERecord?id=CVE-2007-5379
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2007-5379.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2007-5379
Aliases
Downstream
Withdrawn
2026-01-27T04:08:13.877228Z
Published
2007-10-19T23:17:00Z
Modified
2026-01-27T04:08:13.877228Z
Summary
[none]
Details

Rails before 1.2.4, as used for Ruby on Rails, allows remote attackers and ActiveResource servers to determine the existence of arbitrary files and read arbitrary XML files via the Hash.fromxml (Hash#fromxml) method, which uses XmlSimple (XML::Simple) unsafely, as demonstrated by reading passwords from the Pidgin (Gaim) .purple/accounts.xml file.

References

Affected packages