A remote code execution vulnerability in development mode Rails <5.2.2.1, <6.0.0.beta3 can allow an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.
References
Link | Resource |
---|---|
https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/ | Patch Vendor Advisory |
https://groups.google.com/forum/#!topic/rubyonrails-security/IsQKvDqZdKw | Mitigation Patch Third Party Advisory |
http://packetstormsecurity.com/files/152704/Ruby-On-Rails-DoubleTap-Development-Mode-secret_key_base-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
https://www.exploit-db.com/exploits/46785/ | Exploit Third Party Advisory VDB Entry |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/ | Mailing List Third Party Advisory |
Configurations
Information
Published : 2019-03-27 07:29
Updated : 2021-11-03 11:19
NVD link : CVE-2019-5420
Mitre link : CVE-2019-5420
JSON object : View
CWE
CWE-330
Use of Insufficiently Random Values
Products Affected
debian
- debian_linux
rubyonrails
- rails
fedoraproject
- fedora