CISA KEV 정보
| 취약점명 | Rails Ruby on Rails Path Traversal Vulnerability |
|---|---|
| 설명 | Rails Ruby on Rails contains a path traversal vulnerability in Action View. Specially crafted accept headers in combination with calls to `render file:` can cause arbitrary files on the target server to be rendered, disclosing the file contents. |
| 조치사항 | Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. |
| 랜섬웨어 캠페인 악용 | Unknown |
| CWE | CWE-22 |
| 등록일 (KEV) | 2025-07-07 |
| 조치 기한 | 2025-07-28 |
| 추가 참고 | https://web.archive.org/web/20190313201629/https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/ ; https://nvd.nist.gov/vuln/detail/CVE-2019-5418 |
NVD 상세 정보
CVSS v3.1: 7.5 HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NCVSS v2.0: 5.0
AV:N/AC:L/Au:N/C:P/I:N/A:N설명: There is a File Content Disclosure vulnerability in Action View <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 and v3 where specially crafted accept headers can cause contents of arbitrary files on the target system's filesystem to be exposed.
CWE: CWE-22
참조
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00011.html [Mailing List, Third Party Advisory]
- http://packetstormsecurity.com/files/152178/Rails-5.2.1-Arbitrary-File-Content-Disclosure.html [Exploit, Third Party Advisory, VDB Entry]
- http://www.openwall.com/lists/oss-security/2019/03/22/1 [Mailing List, Mitigation, Patch, Third Party Advisory]
- https://access.redhat.com/errata/RHSA-2019:0796 [Third Party Advisory]
- https://access.redhat.com/errata/RHSA-2019:1147 [Third Party Advisory]
- https://access.redhat.com/errata/RHSA-2019:1149 [Third Party Advisory]
- https://access.redhat.com/errata/RHSA-2019:1289 [Third Party Advisory]
- https://groups.google.com/forum/#%21topic/rubyonrails-security/pFRKI96Sm8Q [Permissions Required]
- https://lists.debian.org/debian-lts-announce/2019/03/msg00042.html [Mailing List, Third Party Advisory]
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/ [Third Party Advisory]
- https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/ [Broken Link, Patch, Vendor Advisory]
- https://www.exploit-db.com/exploits/46585/ [Exploit, Third Party Advisory, VDB Entry]
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00011.html [Mailing List, Third Party Advisory]
- http://packetstormsecurity.com/files/152178/Rails-5.2.1-Arbitrary-File-Content-Disclosure.html [Exploit, Third Party Advisory, VDB Entry]
- http://www.openwall.com/lists/oss-security/2019/03/22/1 [Mailing List, Mitigation, Patch, Third Party Advisory]
- ... 외 11건
This product uses the NVD API but is not endorsed or certified by the NVD.