Directory traversal vulnerability in actionpack/lib/abstract_controller/base.rb in the implicit-render implementation in Ruby on Rails before 3.2.18, 4.0.x before 4.0.5, and 4.1.x before 4.1.1, when certain route globbing configurations are enabled, allows remote attackers to read arbitrary files via a crafted request.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://rhn.redhat.com/errata/RHSA-2014-1863.html | third party advisory vendor advisory |
http://matasano.com/research/AnatomyOfRailsVuln-CVE-2014-0130.pdf | technical description broken link |
https://groups.google.com/forum/message/raw?msg=rubyonrails-security/NkKc7vTW70o/NxW_PDBSG3AJ | mailing list third party advisory broken link |
http://www.securityfocus.com/bid/67244 | vdb entry third party advisory broken link |