Skip to content

Commit a515bc7

Browse files
greysteilreedloden
authored andcommitted
Add CVE-2018-16477 (ActiveStorage) (#371)
Add CVE-2018-16477 for ActiveStorage
1 parent 25eb466 commit a515bc7

1 file changed

Lines changed: 42 additions & 0 deletions

File tree

Lines changed: 42 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,42 @@
1+
---
2+
gem: activestorage
3+
cve: 2018-16477
4+
url: https://groups.google.com/forum/#!topic/rubyonrails-security/3KQRnXDIuLg
5+
title: Bypass vulnerability in Active Storage
6+
date: 2018-11-27
7+
8+
description: |
9+
There is a vulnerability in Active Storage. This vulnerability has been
10+
assigned the CVE identifier CVE-2018-16477.
11+
12+
Versions Affected: >= 5.2.0
13+
Not affected: < 5.2.0
14+
Fixed Versions: 5.2.1.1
15+
16+
Impact
17+
------
18+
Signed download URLs generated by `ActiveStorage` for Google Cloud Storage
19+
service and Disk service include `content-disposition` and `content-type`
20+
parameters that an attacker can modify. This can be used to upload specially
21+
crafted HTML files and have them served and executed inline. Combined with
22+
other techniques such as cookie bombing and specially crafted AppCache manifests,
23+
an attacker can gain access to private signed URLs within a specific storage path.
24+
25+
Vulnerable apps are those using either GCS or the Disk service in production.
26+
Other storage services such as S3 or Azure aren't affected.
27+
28+
All users running an affected release should either upgrade or use one of the
29+
workarounds immediately. For those using GCS, it's also recommended to run the
30+
following to update existing blobs:
31+
32+
```
33+
ActiveStorage::Blob.find_each do |blob|
34+
blob.send :update_service_metadata
35+
end
36+
```
37+
38+
unaffected_versions:
39+
- "< 5.2.0"
40+
41+
patched_versions:
42+
- ">= 5.2.1.1"

0 commit comments

Comments
 (0)