{
  "affected": [
    {
      "ranges": [
        {
          "database_specific": {
            "versions": [
              {
                "introduced": "0"
              },
              {
                "last_affected": "1.4.2"
              }
            ]
          },
          "events": [
            {
              "introduced": "0"
            },
            {
              "last_affected": "346c656620bd33bf090ca10785b7fa2b54ec2d55"
            }
          ],
          "repo": "https://github.com/ruby/webrick",
          "type": "GIT"
        }
      ]
    }
  ],
  "details": "The WEBrick gem 1.4.2 for Ruby allows directory traversal if the attacker once had local access to create a symlink to a location outside of the web root directory. NOTE: The vendor states that this is analogous to Options FollowSymlinks in the Apache HTTP Server, and therefore it is \"not a problem.",
  "id": "CVE-2019-11879",
  "modified": "2026-03-13T21:58:42.193494841Z",
  "published": "2019-05-10T16:29:01.737Z",
  "references": [
    {
      "type": "REPORT",
      "url": "https://bugs.ruby-lang.org/issues/15835"
    }
  ],
  "severity": [
    {
      "score": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
      "type": "CVSS_V3"
    }
  ]
}