cfscode / resque-web

a Rails-based web interface to Resque
0 stars 0 forks source link

CVE-2019-5418 (High) detected in multiple libraries #34

Open mend-bolt-for-github[bot] opened 3 years ago

mend-bolt-for-github[bot] commented 3 years ago

CVE-2019-5418 - High Severity Vulnerability

Vulnerable Libraries - rails-5.0.2.gem, actionview-5.0.2.gem, actionpack-5.0.2.gem

rails-5.0.2.gem

Ruby on Rails is a full-stack web framework optimized for programmer happiness and sustainable productivity. It encourages beautiful code by favoring convention over configuration.

Library home page: https://rubygems.org/gems/rails-5.0.2.gem

Path to dependency file: /Gemfile.lock

Path to vulnerable library: /Gemfile.lock

Dependency Hierarchy: - minitest-spec-rails-5.4.0.gem (Root Library) - :x: **rails-5.0.2.gem** (Vulnerable Library)

actionview-5.0.2.gem

Simple, battle-tested conventions and helpers for building web pages.

Library home page: https://rubygems.org/gems/actionview-5.0.2.gem

Path to dependency file: /Gemfile.lock

Path to vulnerable library: /Gemfile.lock

Dependency Hierarchy: - dotenv-rails-2.2.0.gem (Root Library) - railties-5.0.2.gem - actionpack-5.0.2.gem - :x: **actionview-5.0.2.gem** (Vulnerable Library)

actionpack-5.0.2.gem

Web apps on Rails. Simple, battle-tested conventions for building and testing MVC web applications. Works with any Rack-compatible server.

Library home page: https://rubygems.org/gems/actionpack-5.0.2.gem

Path to dependency file: /Gemfile.lock

Path to vulnerable library: /Gemfile.lock

Dependency Hierarchy: - dotenv-rails-2.2.0.gem (Root Library) - railties-5.0.2.gem - :x: **actionpack-5.0.2.gem** (Vulnerable Library)

Found in base branch: master

Vulnerability Details

There is a File Content Disclosure vulnerability in Action View <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 and v3 where specially crafted accept headers can cause contents of arbitrary files on the target system's filesystem to be exposed.

Publish Date: 2019-03-27

URL: CVE-2019-5418

CVSS 3 Score Details (7.5)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: None - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: None - Availability Impact: None

For more information on CVSS3 Scores, click here.

Suggested Fix

Type: Upgrade version

Origin: https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/

Release Date: 2019-03-27

Fix Resolution: 4.2.11.1, 5.0.7.2, 5.1.6.2, 5.2.2.1


Step up your Open Source Security Game with Mend here