A remote code execution vulnerability in development mode Rails <5.2.2.1, <6.0.0.beta3 can allow an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.
References
Configurations
History
21 Nov 2024, 04:44
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/152704/Ruby-On-Rails-DoubleTap-Development-Mode-secret_key_base-Remote-Code-Execution.html - Exploit, Third Party Advisory, VDB Entry | |
References | () https://groups.google.com/forum/#%21topic/rubyonrails-security/IsQKvDqZdKw - | |
References | () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/ - | |
References | () https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/ - Patch, Vendor Advisory | |
References | () https://www.exploit-db.com/exploits/46785/ - Exploit, Third Party Advisory, VDB Entry |
07 Nov 2023, 03:11
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2019-03-27 14:29
Updated : 2024-11-21 04:44
NVD link : CVE-2019-5420
Mitre link : CVE-2019-5420
CVE.ORG link : CVE-2019-5420
JSON object : View
Products Affected
rubyonrails
- rails
debian
- debian_linux
fedoraproject
- fedora