vulnerability

Gentoo Linux: CVE-2017-1002201: Haml: Arbitrary code execution

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
Oct 15, 2019
Added
Jul 28, 2020
Modified
Aug 13, 2025

Description

In haml versions prior to version 5.0.0.beta.2, when using user input to perform tasks on the server, characters like < > " ' must be escaped properly. In this case, the ' character was missed. An attacker can manipulate the input to introduce additional attributes, potentially executing code.

Solution

gentoo-linux-upgrade-dev-ruby-haml
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.