Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-m42h-mh85-4qgc

Опубликовано: 13 мар. 2019
Источник: github
Github: Прошло ревью
CVSS3: 9.8

Описание

Use of Insufficiently Random Values in Railties Allows Remote Code Execution

Possible Remote Code Execution Exploit in Rails Development Mode

Impact

With some knowledge of a target application it is possible for an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.

All users running an affected release should either upgrade or use one of the workarounds immediately.

Releases

The 6.0.0.beta3 and 5.2.2.1 releases are available at the normal locations.

Workarounds

This issue can be mitigated by specifying a secret key in development mode. In "config/environments/development.rb" add this:

config.secret_key_base = SecureRandom.hex(64)

Please note that only the 5.2.x, 5.1.x, 5.0.x, and 4.2.x series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases.

Credits

Thanks to ooooooo_q

Пакеты

Наименование

railties

rubygems
Затронутые версииВерсия исправления

>= 5.2.0, <= 5.2.2.0

5.2.2.1

EPSS

Процентиль: 100%
0.93102
Критический

9.8 Critical

CVSS3

Дефекты

CWE-330
CWE-77

Связанные уязвимости

CVSS3: 9.8
ubuntu
почти 7 лет назад

A remote code execution vulnerability in development mode Rails <5.2.2.1, <6.0.0.beta3 can allow an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.

CVSS3: 8.1
redhat
почти 7 лет назад

A remote code execution vulnerability in development mode Rails <5.2.2.1, <6.0.0.beta3 can allow an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.

CVSS3: 9.8
nvd
почти 7 лет назад

A remote code execution vulnerability in development mode Rails <5.2.2.1, <6.0.0.beta3 can allow an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.

CVSS3: 9.8
debian
почти 7 лет назад

A remote code execution vulnerability in development mode Rails <5.2.2 ...

CVSS3: 8.1
fstec
почти 7 лет назад

Уязвимость программной платформы Ruby on Rails, связанная с ошибками в коде генератора псевдослучайных чисел, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 100%
0.93102
Критический

9.8 Critical

CVSS3

Дефекты

CWE-330
CWE-77