8.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N
rack is vulnerable to directory traversal. The vulnerability exists when directories exists in a director, managed by Rack::Directory
, allows users to read contents of files on the server outside of the root directory of Rack::Directory
.
github.com/rack/rack/commit/64f53e4a8c6dce5da0b7f81c0aa6629cf926cc5a
github.com/rack/rack/pull/1417
groups.google.com/d/msgid/rubyonrails-security/7D86D578-403B-4808-9536-236EDE3F2975%40gmail.com.
groups.google.com/g/rubyonrails-security/c/IOO1vNZTzPA
hackerone.com/reports/434404
lists.debian.org/debian-lts-announce/2020/07/msg00006.html
lists.debian.org/debian-lts-announce/2023/01/msg00038.html
usn.ubuntu.com/4561-1/
8.6 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
NONE
Availability Impact
NONE
AV:N/AC:L/Au:N/C:P/I:N/A:N