Directory traversal vulnerability in actionpack/lib/abstract_controller/base.rb in the implicit-render implementation in Ruby on Rails before 3.2.18, 4.0.x before 4.0.5, and 4.1.x before 4.1.1, when certain route globbing configurations are enabled, allows remote attackers to read arbitrary files via a crafted request.
References
Link | Resource |
---|---|
https://groups.google.com/forum/message/raw?msg=rubyonrails-security/NkKc7vTW70o/NxW_PDBSG3AJ | Third Party Advisory |
http://matasano.com/research/AnatomyOfRailsVuln-CVE-2014-0130.pdf | Technical Description |
http://rhn.redhat.com/errata/RHSA-2014-1863.html | Third Party Advisory |
http://www.securityfocus.com/bid/67244 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2014-05-07 03:55
Updated : 2023-02-12 16:32
NVD link : CVE-2014-0130
Mitre link : CVE-2014-0130
JSON object : View
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Products Affected
rubyonrails
- rails
- ruby_on_rails
redhat
- subscription_asset_manager