Bug 1095105 (CVE-2014-0130)
Summary: | CVE-2014-0130 rubygem-actionpack: directory traversal issue | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | Murray McAllister <mmcallis> |
Component: | vulnerability | Assignee: | Red Hat Product Security <security-response-team> |
Status: | CLOSED ERRATA | QA Contact: | |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | unspecified | CC: | abaron, aortega, apevec, athomas, ayoung, bdunne, bkabrda, bkearney, bleanhar, carnil, ccoleman, chrisw, dajohnso, dclarizi, dmcphers, gkotton, gmccullo, gmollett, jdetiber, jeckersb, jfrey, jialiu, jkeck, jrafanie, jrusnack, jstribny, katello-bugs, kseifried, lhh, lmeyer, markmc, mastahnke, mmaslano, mmcgrath, mmorsi, mtasaka, obarenbo, rbryant, rhos-maint, sclewis, sseago, s, vanmeeuwen+fedora, vondruch, xlecauch, yeylon |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: |
A directory traversal flaw was found in the way Ruby on Rails handled wildcard segments in routes with implicit rendering. A remote attacker could use this flaw to retrieve arbitrary local files accessible to a Ruby on Rails application using the aforementioned routes via a specially crafted request.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | 2015-01-17 05:36:03 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 1095117, 1095118, 1095119, 1095120, 1095121, 1095122, 1095123, 1095124, 1095125, 1095126, 1095127, 1095128, 1095129, 1095131, 1095172, 1096085, 1096086, 1102307, 1102308, 1102309, 1102310, 1102311, 1102312 | ||
Bug Blocks: | 1000138, 1086525, 1095109 |
Description
Murray McAllister
2014-05-07 07:26:57 UTC
Created rubygem-actionmailer tracking bugs for this issue: Affects: fedora-all [bug 1095119] Affects: epel-5 [bug 1095120] Created rubygem-activesupport tracking bugs for this issue: Affects: fedora-all [bug 1095128] Affects: epel-all [bug 1095129] Created rubygem-activeresource tracking bugs for this issue: Affects: fedora-all [bug 1095126] Affects: epel-5 [bug 1095127] Created rubygem-rails tracking bugs for this issue: Affects: fedora-all [bug 1095117] Affects: epel-5 [bug 1095118] Created rubygem-activerecord tracking bugs for this issue: Affects: fedora-all [bug 1095124] Affects: epel-5 [bug 1095125] Created rubygem-activemodel tracking bugs for this issue: Affects: fedora-all [bug 1095123] Created rubygem-actionpack tracking bugs for this issue: Affects: fedora-all [bug 1095121] Affects: epel-5 [bug 1095122] Created rubygem-railties tracking bugs for this issue: Affects: fedora-all [bug 1095131] Could you be please more careful opening issues for separate Rails packages? Checking the patches, it is usually just fix in actionpack, and one additional test fix in railties for 4.0.x. Opening issues for other Rails components does not make too much sense. Thanks. Blog post from the original reporters: http://blog.flowdock.com/2014/05/07/how-we-found-a-directory-traversal-vulnerability-in-rails-routes/ This issue has been addressed in following products: Red Hat Software Collections for RHEL-6 Via RHSA-2014:0510 https://rhn.redhat.com/errata/RHSA-2014-0510.html rubygem-actionpack-4.0.0-4.fc20 has been pushed to the Fedora 20 stable repository. If problems still persist, please make note of it in this bug report. rubygem-actionpack-3.2.13-6.fc19 has been pushed to the Fedora 19 stable repository. If problems still persist, please make note of it in this bug report. Additional information has been released: http://matasano.com/research/AnatomyOfRailsVuln-CVE-2014-0130.pdf This has been upgraded from medium to important due to additional details becoming available. This issue has been addressed in following products: CloudForms Management Engine 5.x Via RHSA-2014:0816 https://rhn.redhat.com/errata/RHSA-2014-0816.html IssueDescription: A directory traversal flaw was found in the way Ruby on Rails handled wildcard segments in routes with implicit rendering. A remote attacker could use this flaw to retrieve arbitrary local files accessible to a Ruby on Rails application using the aforementioned routes via a specially crafted request. This issue has been addressed in the following products: Red Hat Subscription Asset Manager 1.4 Via RHSA-2014:1863 https://rhn.redhat.com/errata/RHSA-2014-1863.html |