Business

News

 
More...

Alerts

 
More...

Events

 
More...
 
     
 

Ruby on Rails "implicit render" Directory Traversal Vulnerability

 

Systems Affected


  • Ruby on Rails versions prior to 3.2.18
  • Ruby on Rails versions prior 4.0.x to 4.0.5
  • Ruby on Rails versions prior 4.1.x to 4.1.1

Threat Level


Medium


Overview


A directory traversal vulnerability has been reported in "implicit render" functionality in Ruby on Rails which could be exploited by a remote attacker to retrieve arbitrary files from the target system.


Description


This vulnerability exists due to improper sanitization of directory traversal character sequences by the action parameters used by the affected application when using globbing routes to send input to the ":action" parameter.

A remote unauthenticated attacker could exploit this vulnerability using specially crafted web request with such a directory traversal character sequence to the targeted system which could allow the attacker to conduct directory traversal attacks on the targeted system and disclose arbitrary files.


Impact



Solution/ Workarounds


Install appropriate security fixes as suggested in vendors advisory
http://weblog.rubyonrails.org/2014/5/6/Rails_3_2_18_4_0_5_and_4_1_1_have_been_released/


References


http://www.cert-in.org.in/


Disclaimer


The information provided herein is on "as is" basis, without warranty of any kind


 
     

© Copyright Sri Lanka CERT|CC. All Rights Reserved.