Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h6h4-9666-mq74

Опубликовано: 02 янв. 2023
Источник: github
Github: Не прошло ревью
CVSS3: 7.5

Описание

A vulnerability was found in rails-cv-app. It has been rated as problematic. Affected by this issue is some unknown functionality of the file app/controllers/uploaded_files_controller.rb. The manipulation with the input ../../../etc/passwd leads to path traversal: '../filedir'. The exploit has been disclosed to the public and may be used. The name of the patch is 0d20362af0a5f8a126f67c77833868908484a863. It is recommended to apply a patch to fix this issue. VDB-217178 is the identifier assigned to this vulnerability.

A vulnerability was found in rails-cv-app. It has been rated as problematic. Affected by this issue is some unknown functionality of the file app/controllers/uploaded_files_controller.rb. The manipulation with the input ../../../etc/passwd leads to path traversal: '../filedir'. The exploit has been disclosed to the public and may be used. The name of the patch is 0d20362af0a5f8a126f67c77833868908484a863. It is recommended to apply a patch to fix this issue. VDB-217178 is the identifier assigned to this vulnerability.

EPSS

Процентиль: 45%
0.0022
Низкий

7.5 High

CVSS3

Дефекты

CWE-22
CWE-24

Связанные уязвимости

CVSS3: 3.5
nvd
около 3 лет назад

A vulnerability was found in rails-cv-app. It has been rated as problematic. Affected by this issue is some unknown functionality of the file app/controllers/uploaded_files_controller.rb. The manipulation with the input ../../../etc/passwd leads to path traversal: '../filedir'. The exploit has been disclosed to the public and may be used. The patch is identified as 0d20362af0a5f8a126f67c77833868908484a863. It is recommended to apply a patch to fix this issue. VDB-217178 is the identifier assigned to this vulnerability.

EPSS

Процентиль: 45%
0.0022
Низкий

7.5 High

CVSS3

Дефекты

CWE-22
CWE-24