Ruby WEBrick Terminal Escape Sequence in Logs Command Injection Vulnerability

Summary
Ruby WEBrick is prone to a command-injection vulnerability because it fails to adequately sanitize user-supplied input in log files. Attackers can exploit this issue to execute arbitrary commands in a terminal. Versions *prior to* the following are affected: Ruby 1.8.6 patchlevel 388 Ruby 1.8.7 patchlevel 249 Ruby 1.9.1 patchlevel 378
Solution
Updates are available. Please see the references for details.
References