ID CVE-2018-16477
Summary A bypass vulnerability in Active Storage >= 5.2.0 for Google Cloud Storage and Disk services allow an attacker to modify the `content-disposition` and `content-type` parameters which can be used in with HTML files and have them executed inline. Additionally, if combined with other techniques such as cookie bombing and specially crafted AppCache manifests, an attacker can gain access to private signed URLs within a specific storage path. This vulnerability has been fixed in version 5.2.1.1.
References
Vulnerable Configurations
  • cpe:2.3:a:rubyonrails:rails:5.2.0:-:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.2.0:-:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.2.0:beta1:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.2.0:beta1:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.2.0:beta2:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.2.0:beta2:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.2.0:rc1:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.2.0:rc1:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.2.0:rc2:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.2.0:rc2:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.2.1:-:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.2.1:-:*:*:*:*:*:*
  • cpe:2.3:a:rubyonrails:rails:5.2.1:rc1:*:*:*:*:*:*
    cpe:2.3:a:rubyonrails:rails:5.2.1:rc1:*:*:*:*:*:*
CVSS
Base: 4.3 (as of 09-10-2019 - 23:36)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
cvss-vector via4 AV:N/AC:M/Au:N/C:N/I:P/A:N
refmap via4
misc
Last major update 09-10-2019 - 23:36
Published 30-11-2018 - 19:29
Last modified 09-10-2019 - 23:36
Back to Top