Miggo Logo

CVE-2019-5418: Path Traversal in Action View

7.5

CVSS Score
3.1

Basic Information

EPSS Score
0.99944%
Published
3/13/2019
Updated
8/17/2023
KEV Status
Yes
Technology
TechnologyRuby

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
actionviewrubygems>= 5.1.0, <= 5.1.6.15.1.6.2
actionviewrubygems>= 5.0.0, <= 5.0.7.15.0.7.2
actionviewrubygems>= 5.2.0, <= 5.2.2.05.2.2.1
actionviewrubygems>= 4.0.0, <= 4.2.11.04.2.11.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability arises from two key components: 1) The render method in controllers using file: without format restrictions allows attackers to control the response format via headers, leading to unintended file rendering. 2) The formats method in ActionDispatch::Request processes malicious accept headers, enabling format injection. The workaround and patches explicitly address these points by restricting formats, confirming their role in the vulnerability. The high confidence stems from the advisory's focus on these mechanisms and the provided mitigations.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

# *il* *ont*nt *is*losur* in **tion Vi*w Imp**t ------ T**r* is * possi*l* *il* *ont*nt *is*losur* vuln*r**ility in **tion Vi*w. Sp**i*lly *r**t** ****pt *****rs in *om*in*tion wit* **lls to `r*n**r *il*:` **n **us* *r*itr*ry *il*s on t** t*r**t

Reasoning

T** vuln*r**ility *ris*s *rom two k*y *ompon*nts: *) T** `r*n**r` m*t*o* in *ontroll*rs usin* `*il*:` wit*out *orm*t r*stri*tions *llows *tt**k*rs to *ontrol t** r*spons* *orm*t vi* *****rs, l***in* to unint*n*** *il* r*n**rin*. *) T** `*orm*ts` m*t*