Lucene search

K
rubygemsRubySecRUBY:SPROCKETS-2018-3760
HistoryJun 18, 2018 - 9:00 p.m.

Path Traversal in Sprockets

2018-06-1821:00:00
RubySec
groups.google.com
8

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.016

Percentile

87.7%

Specially crafted requests can be used to access files that exist on
the filesystem that is outside an application’s root directory, when the
Sprockets server is used in production.

All users running an affected release should either upgrade or use one of the work arounds immediately.

Workaround:
In Rails applications, work around this issue, set config.assets.compile = false and
config.public_file_server.enabled = true in an initializer and precompile the assets.

This work around will not be possible in all hosting environments and upgrading is advised.

Affected configurations

Vulners
Node
rubysprocketsRange≀2.12.5
OR
rubysprocketsRange3.0.0>
OR
rubysprocketsRange≀3.7.2
OR
rubysprocketsRange4.0.0>
OR
rubysprocketsRange≀4.0.0.8
VendorProductVersionCPE
rubysprockets*cpe:2.3:a:ruby:sprockets:*:*:*:*:*:*:*:*

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.016

Percentile

87.7%