Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2020-8161

Опубликовано: 02 июл. 2020
Источник: debian
EPSS Низкий

Описание

A directory traversal vulnerability exists in rack < 2.2.0 that allows an attacker perform directory traversal vulnerability in the Rack::Directory app that is bundled with Rack which could result in information disclosure.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ruby-rackfixed2.1.1-5package

Примечания

  • https://groups.google.com/forum/#!msg/rubyonrails-security/IOO1vNZTzPA/Ylzi1UYLAAAJ

  • Fixed by: https://github.com/rack/rack/commit/dddb7ad18ed79ca6ab06ccc417a169fde451246e

  • Required followup: https://github.com/rack/rack/commit/e7ba1b0557d3ad97af1ef113bbeb5f27417983fa

  • Test: https://github.com/rack/rack/commit/775c836bdd25b63340399fea739532d746860a94

EPSS

Процентиль: 64%
0.00475
Низкий

Связанные уязвимости

CVSS3: 8.6
ubuntu
больше 5 лет назад

A directory traversal vulnerability exists in rack < 2.2.0 that allows an attacker perform directory traversal vulnerability in the Rack::Directory app that is bundled with Rack which could result in information disclosure.

CVSS3: 5.9
redhat
больше 5 лет назад

A directory traversal vulnerability exists in rack < 2.2.0 that allows an attacker perform directory traversal vulnerability in the Rack::Directory app that is bundled with Rack which could result in information disclosure.

CVSS3: 8.6
nvd
больше 5 лет назад

A directory traversal vulnerability exists in rack < 2.2.0 that allows an attacker perform directory traversal vulnerability in the Rack::Directory app that is bundled with Rack which could result in information disclosure.

CVSS3: 8.6
github
больше 5 лет назад

Directory traversal in Rack::Directory app bundled with Rack

CVSS3: 8.6
fstec
больше 5 лет назад

Уязвимость функции check_forbidden из rack/directory.rb модульного интерфейса между веб-серверами и веб-приложениями Rack, позволяющая нарушителю получить доступ к конфиденциальным данным

EPSS

Процентиль: 64%
0.00475
Низкий