Directory traversal vulnerability in WEBrick in Ruby 1.8 before 1.8.5-p115 and 1.8.6-p114, and 1.9 through 1.9.0-1, when running on systems that support backslash (\) path separators or case-insensitive file names, allows remote attackers to access arbitrary files via (1) "..%5c" (encoded backslash) sequences or (2) filenames that match patterns in the :NondisclosureName option.
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00354.html
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00338.html
https://exchange.xforce.ibmcloud.com/vulnerabilities/41010
http://www.vupen.com/english/advisories/2008/1981/references
http://www.vupen.com/english/advisories/2008/0787
http://www.securityfocus.com/archive/1/490056/100/0/threaded
http://www.securityfocus.com/archive/1/489218/100/0/threaded
http://www.securityfocus.com/archive/1/489205/100/0/threaded
http://www.redhat.com/support/errata/RHSA-2008-0897.html
http://www.kb.cert.org/vuls/id/404515
http://support.apple.com/kb/HT2163
http://secunia.com/advisories/32371
http://secunia.com/advisories/31687
http://secunia.com/advisories/30802
http://secunia.com/advisories/29536
http://secunia.com/advisories/29357
http://secunia.com/advisories/29232
http://lists.opensuse.org/opensuse-security-announce/2008-08/msg00006.html