CVE-2019-5418

There is a File Content Disclosure vulnerability in Action View <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 and v3 where specially crafted accept headers can cause contents of arbitrary files on the target system's filesystem to be exposed.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00011.html Mailing List Third Party Advisory
http://packetstormsecurity.com/files/152178/Rails-5.2.1-Arbitrary-File-Content-Disclosure.html Exploit Third Party Advisory VDB Entry
http://www.openwall.com/lists/oss-security/2019/03/22/1 Mailing List Mitigation Patch Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0796 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1147 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1149 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1289 Third Party Advisory
https://groups.google.com/forum/#%21topic/rubyonrails-security/pFRKI96Sm8Q
https://lists.debian.org/debian-lts-announce/2019/03/msg00042.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/
https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/ Patch Vendor Advisory
https://www.exploit-db.com/exploits/46585/ Exploit Third Party Advisory VDB Entry
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00011.html Mailing List Third Party Advisory
http://packetstormsecurity.com/files/152178/Rails-5.2.1-Arbitrary-File-Content-Disclosure.html Exploit Third Party Advisory VDB Entry
http://www.openwall.com/lists/oss-security/2019/03/22/1 Mailing List Mitigation Patch Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:0796 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1147 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1149 Third Party Advisory
https://access.redhat.com/errata/RHSA-2019:1289 Third Party Advisory
https://groups.google.com/forum/#%21topic/rubyonrails-security/pFRKI96Sm8Q
https://lists.debian.org/debian-lts-announce/2019/03/msg00042.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/
https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/ Patch Vendor Advisory
https://www.exploit-db.com/exploits/46585/ Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:a:redhat:cloudforms:4.7:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*

Configuration 5 (hide)

cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:a:redhat:cloudforms:4.6:*:*:*:*:*:*:*
cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 04:44

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00011.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00011.html - Mailing List, Third Party Advisory
References () http://packetstormsecurity.com/files/152178/Rails-5.2.1-Arbitrary-File-Content-Disclosure.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/152178/Rails-5.2.1-Arbitrary-File-Content-Disclosure.html - Exploit, Third Party Advisory, VDB Entry
References () http://www.openwall.com/lists/oss-security/2019/03/22/1 - Mailing List, Mitigation, Patch, Third Party Advisory () http://www.openwall.com/lists/oss-security/2019/03/22/1 - Mailing List, Mitigation, Patch, Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:0796 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:0796 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:1147 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:1147 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:1149 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:1149 - Third Party Advisory
References () https://access.redhat.com/errata/RHSA-2019:1289 - Third Party Advisory () https://access.redhat.com/errata/RHSA-2019:1289 - Third Party Advisory
References () https://groups.google.com/forum/#%21topic/rubyonrails-security/pFRKI96Sm8Q - () https://groups.google.com/forum/#%21topic/rubyonrails-security/pFRKI96Sm8Q -
References () https://lists.debian.org/debian-lts-announce/2019/03/msg00042.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2019/03/msg00042.html - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/ -
References () https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/ - Patch, Vendor Advisory () https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/ - Patch, Vendor Advisory
References () https://www.exploit-db.com/exploits/46585/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/46585/ - Exploit, Third Party Advisory, VDB Entry

07 Nov 2023, 03:11

Type Values Removed Values Added
References
  • {'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/pFRKI96Sm8Q', 'name': 'https://groups.google.com/forum/#!topic/rubyonrails-security/pFRKI96Sm8Q', 'tags': ['Exploit', 'Mitigation', 'Patch', 'Third Party Advisory'], 'refsource': 'CONFIRM'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/', 'name': 'FEDORA-2019-1cfe24db5c', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/ -
  • () https://groups.google.com/forum/#%21topic/rubyonrails-security/pFRKI96Sm8Q -

Information

Published : 2019-03-27 14:29

Updated : 2024-11-21 04:44


NVD link : CVE-2019-5418

Mitre link : CVE-2019-5418

CVE.ORG link : CVE-2019-5418


JSON object : View

Products Affected

redhat

  • cloudforms
  • software_collections

opensuse

  • leap

rubyonrails

  • rails

debian

  • debian_linux

fedoraproject

  • fedora
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

NVD-CWE-noinfo