Vulnerability CVE-2014-0130


Published: 2014-05-07

Description:
Directory traversal vulnerability in actionpack/lib/abstract_controller/base.rb in the implicit-render implementation in Ruby on Rails before 3.2.18, 4.0.x before 4.0.5, and 4.1.x before 4.1.1, when certain route globbing configurations are enabled, allows remote attackers to read arbitrary files via a crafted request.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Ruby on Rails Directory Traversal Vulnerability With Certain Route Configurations
Ville
07.05.2014

Type:

CWE-22

(Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal'))

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Rubyonrails -> Ruby on rails 
Rubyonrails -> Rails 
Redhat -> Subscription asset manager 

 References:
http://matasano.com/research/AnatomyOfRailsVuln-CVE-2014-0130.pdf
http://rhn.redhat.com/errata/RHSA-2014-1863.html
http://www.securityfocus.com/bid/67244
https://groups.google.com/forum/message/raw?msg=rubyonrails-security/NkKc7vTW70o/NxW_PDBSG3AJ

Copyright 2024, cxsecurity.com

 

Back to Top