File tree Expand file tree Collapse file tree
Expand file tree Collapse file tree Original file line number Diff line number Diff line change 1+ ---
2+ gem : activestorage
3+ cve : 2018-16477
4+ url : https://groups.google.com/forum/#!topic/rubyonrails-security/3KQRnXDIuLg
5+ title : Bypass vulnerability in Active Storage
6+ date : 2018-11-27
7+
8+ description : |
9+ There is a vulnerability in Active Storage. This vulnerability has been
10+ assigned the CVE identifier CVE-2018-16477.
11+
12+ Versions Affected: >= 5.2.0
13+ Not affected: < 5.2.0
14+ Fixed Versions: 5.2.1.1
15+
16+ Impact
17+ ------
18+ Signed download URLs generated by `ActiveStorage` for Google Cloud Storage
19+ service and Disk service include `content-disposition` and `content-type`
20+ parameters that an attacker can modify. This can be used to upload specially
21+ crafted HTML files and have them served and executed inline. Combined with
22+ other techniques such as cookie bombing and specially crafted AppCache manifests,
23+ an attacker can gain access to private signed URLs within a specific storage path.
24+
25+ Vulnerable apps are those using either GCS or the Disk service in production.
26+ Other storage services such as S3 or Azure aren't affected.
27+
28+ All users running an affected release should either upgrade or use one of the
29+ workarounds immediately. For those using GCS, it's also recommended to run the
30+ following to update existing blobs:
31+
32+ ```
33+ ActiveStorage::Blob.find_each do |blob|
34+ blob.send :update_service_metadata
35+ end
36+ ```
37+
38+ unaffected_versions :
39+ - " < 5.2.0"
40+
41+ patched_versions :
42+ - " >= 5.2.1.1"
You can’t perform that action at this time.
0 commit comments