CVE-2019-5420

A remote code execution vulnerability in development mode Rails <5.2.2.1, <6.0.0.beta3 can allow an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:6.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:6.0.0:beta2:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*

History

21 Nov 2024, 04:44

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/152704/Ruby-On-Rails-DoubleTap-Development-Mode-secret_key_base-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/152704/Ruby-On-Rails-DoubleTap-Development-Mode-secret_key_base-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry
References () https://groups.google.com/forum/#%21topic/rubyonrails-security/IsQKvDqZdKw - () https://groups.google.com/forum/#%21topic/rubyonrails-security/IsQKvDqZdKw -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/ -
References () https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/ - Patch, Vendor Advisory () https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/ - Patch, Vendor Advisory
References () https://www.exploit-db.com/exploits/46785/ - Exploit, Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/46785/ - Exploit, Third Party Advisory, VDB Entry

07 Nov 2023, 03:11

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/', 'name': 'FEDORA-2019-1cfe24db5c', 'tags': ['Mailing List', 'Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://groups.google.com/forum/#!topic/rubyonrails-security/IsQKvDqZdKw', 'name': 'https://groups.google.com/forum/#!topic/rubyonrails-security/IsQKvDqZdKw', 'tags': ['Mitigation', 'Patch', 'Third Party Advisory'], 'refsource': 'CONFIRM'}
  • () https://groups.google.com/forum/#%21topic/rubyonrails-security/IsQKvDqZdKw -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/ -

Information

Published : 2019-03-27 14:29

Updated : 2024-11-21 04:44


NVD link : CVE-2019-5420

Mitre link : CVE-2019-5420

CVE.ORG link : CVE-2019-5420


JSON object : View

Products Affected

rubyonrails

  • rails

debian

  • debian_linux

fedoraproject

  • fedora
CWE
CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')

CWE-330

Use of Insufficiently Random Values