CVE-2019-5418: Path Traversal in Action View
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.99944%
CWE
Published
3/13/2019
Updated
8/17/2023
KEV Status
Yes
Technology
Ruby
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
actionview | rubygems | >= 5.1.0, <= 5.1.6.1 | 5.1.6.2 |
actionview | rubygems | >= 5.0.0, <= 5.0.7.1 | 5.0.7.2 |
actionview | rubygems | >= 5.2.0, <= 5.2.2.0 | 5.2.2.1 |
actionview | rubygems | >= 4.0.0, <= 4.2.11.0 | 4.2.11.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability arises from two key components: 1) The render
method in controllers using file:
without format restrictions allows attackers to control the response format via headers, leading to unintended file rendering. 2) The formats
method in ActionDispatch::Request processes malicious accept headers, enabling format injection. The workaround and patches explicitly address these points by restricting formats, confirming their role in the vulnerability. The high confidence stems from the advisory's focus on these mechanisms and the provided mitigations.