<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cpe="http://cpe.mitre.org/language/2.0" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvssv2="http://scap.nist.gov/schema/cvss-v2/1.0" xmlns:cvssv3="https://www.first.org/cvss/cvss-v3.0.xsd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:ns0="http://purl.org/dc/elements/1.1/" xmlns:prod="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod" xmlns:scap-core="http://scap.nist.gov/schema/scap-core/1.0" xmlns:sch="http://purl.oclc.org/dsdl/schematron" xmlns:vuln="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
  <DocumentTitle xml:lang="en">CVE-2011-0449</DocumentTitle>
  <DocumentType>SUSE CVE</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE CVE-2011-0449</ID>
    </Identification>
    <Status>Interim</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>10</Number>
        <Date>2022-10-15T18:02:15Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-05-30T12:55:54Z</InitialReleaseDate>
    <CurrentReleaseDate>2022-10-15T18:02:15Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf-cve.pl</Engine>
      <Date>2020-12-27T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="CVE" Type="Summary" Ordinal="1" xml:lang="en">CVE-2011-0449</Note>
    <Note Title="Mitre CVE Description" Type="Description" Ordinal="2" xml:lang="en">actionpack/lib/action_view/template/resolver.rb in Ruby on Rails 3.0.x before 3.0.4, when a case-insensitive filesystem is used, does not properly implement filters associated with the list of available templates, which allows remote attackers to bypass intended access restrictions via an action name that uses an unintended case for alphabetic characters.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="4" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2012-March/000065.html</URL>
      <Description>E-Mail link for SUSE-SU-2012:0434-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-updates/2011-12/msg00004.html</URL>
      <Description>E-Mail link for openSUSE-SU-2011:1305-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod">
    <Branch Type="Product Family" Name="SUSE Studio Onsite Runner 1.2">
      <Branch Type="Product Name" Name="SUSE Studio Onsite Runner 1.2">
        <FullProductName ProductID="SUSE Studio Onsite Runner 1.2" CPE="cpe:/o:suse:suse-studio-onsite-runner:1.2">SUSE Studio Onsite Runner 1.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="rubygem-actionmailer-2_3-2.3.14-0.7.4.3">
      <FullProductName ProductID="rubygem-actionmailer-2_3-2.3.14-0.7.4.3">rubygem-actionmailer-2_3-2.3.14-0.7.4.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rubygem-actionpack-2_3-2.3.14-0.7.4.3">
      <FullProductName ProductID="rubygem-actionpack-2_3-2.3.14-0.7.4.3">rubygem-actionpack-2_3-2.3.14-0.7.4.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rubygem-activerecord-2_3-2.3.14-0.7.4.3">
      <FullProductName ProductID="rubygem-activerecord-2_3-2.3.14-0.7.4.3">rubygem-activerecord-2_3-2.3.14-0.7.4.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rubygem-activeresource-2_3-2.3.14-0.7.4.3">
      <FullProductName ProductID="rubygem-activeresource-2_3-2.3.14-0.7.4.3">rubygem-activeresource-2_3-2.3.14-0.7.4.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rubygem-activesupport-2_3-2.3.14-0.7.4.3">
      <FullProductName ProductID="rubygem-activesupport-2_3-2.3.14-0.7.4.3">rubygem-activesupport-2_3-2.3.14-0.7.4.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rubygem-rack-1.1.2-0.8.8.3">
      <FullProductName ProductID="rubygem-rack-1.1.2-0.8.8.3" CPE="cpe:2.3:a:rack_project:rack:1.1.2:*:*:*:*:*:*:*">rubygem-rack-1.1.2-0.8.8.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="rubygem-rails-2_3-2.3.14-0.7.4.3">
      <FullProductName ProductID="rubygem-rails-2_3-2.3.14-0.7.4.3">rubygem-rails-2_3-2.3.14-0.7.4.3</FullProductName>
    </Branch>
    <Relationship ProductReference="rubygem-actionmailer-2_3-2.3.14-0.7.4.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Studio Onsite Runner 1.2">
      <FullProductName ProductID="SUSE Studio Onsite Runner 1.2:rubygem-actionmailer-2_3-2.3.14-0.7.4.3">rubygem-actionmailer-2_3-2.3.14-0.7.4.3 as a component of SUSE Studio Onsite Runner 1.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-actionpack-2_3-2.3.14-0.7.4.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Studio Onsite Runner 1.2">
      <FullProductName ProductID="SUSE Studio Onsite Runner 1.2:rubygem-actionpack-2_3-2.3.14-0.7.4.3">rubygem-actionpack-2_3-2.3.14-0.7.4.3 as a component of SUSE Studio Onsite Runner 1.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-activerecord-2_3-2.3.14-0.7.4.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Studio Onsite Runner 1.2">
      <FullProductName ProductID="SUSE Studio Onsite Runner 1.2:rubygem-activerecord-2_3-2.3.14-0.7.4.3">rubygem-activerecord-2_3-2.3.14-0.7.4.3 as a component of SUSE Studio Onsite Runner 1.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-activeresource-2_3-2.3.14-0.7.4.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Studio Onsite Runner 1.2">
      <FullProductName ProductID="SUSE Studio Onsite Runner 1.2:rubygem-activeresource-2_3-2.3.14-0.7.4.3">rubygem-activeresource-2_3-2.3.14-0.7.4.3 as a component of SUSE Studio Onsite Runner 1.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-activesupport-2_3-2.3.14-0.7.4.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Studio Onsite Runner 1.2">
      <FullProductName ProductID="SUSE Studio Onsite Runner 1.2:rubygem-activesupport-2_3-2.3.14-0.7.4.3">rubygem-activesupport-2_3-2.3.14-0.7.4.3 as a component of SUSE Studio Onsite Runner 1.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-rack-1.1.2-0.8.8.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Studio Onsite Runner 1.2">
      <FullProductName ProductID="SUSE Studio Onsite Runner 1.2:rubygem-rack-1.1.2-0.8.8.3">rubygem-rack-1.1.2-0.8.8.3 as a component of SUSE Studio Onsite Runner 1.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="rubygem-rails-2_3-2.3.14-0.7.4.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Studio Onsite Runner 1.2">
      <FullProductName ProductID="SUSE Studio Onsite Runner 1.2:rubygem-rails-2_3-2.3.14-0.7.4.3">rubygem-rails-2_3-2.3.14-0.7.4.3 as a component of SUSE Studio Onsite Runner 1.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">actionpack/lib/action_view/template/resolver.rb in Ruby on Rails 3.0.x before 3.0.4, when a case-insensitive filesystem is used, does not properly implement filters associated with the list of available templates, which allows remote attackers to bypass intended access restrictions via an action name that uses an unintended case for alphabetic characters.</Note>
    </Notes>
    <CVE>CVE-2011-0449</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Studio Onsite Runner 1.2:rubygem-actionmailer-2_3-2.3.14-0.7.4.3</ProductID>
        <ProductID>SUSE Studio Onsite Runner 1.2:rubygem-actionpack-2_3-2.3.14-0.7.4.3</ProductID>
        <ProductID>SUSE Studio Onsite Runner 1.2:rubygem-activerecord-2_3-2.3.14-0.7.4.3</ProductID>
        <ProductID>SUSE Studio Onsite Runner 1.2:rubygem-activeresource-2_3-2.3.14-0.7.4.3</ProductID>
        <ProductID>SUSE Studio Onsite Runner 1.2:rubygem-activesupport-2_3-2.3.14-0.7.4.3</ProductID>
        <ProductID>SUSE Studio Onsite Runner 1.2:rubygem-rack-1.1.2-0.8.8.3</ProductID>
        <ProductID>SUSE Studio Onsite Runner 1.2:rubygem-rails-2_3-2.3.14-0.7.4.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSetV2>
        <BaseScoreV2>7.5</BaseScoreV2>
        <VectorV2>AV:N/AC:L/Au:N/C:P/I:P/A:P</VectorV2>
      </ScoreSetV2>
    </CVSSScoreSets>
  </Vulnerability>
</cvrfdoc>
