There is a vulnerability in actionpack_page-caching gem < v1.2.1 that allows an attacker to write arbitrary files to a web server, potentially resulting in remote code execution if the attacker can write unescaped ERB to a view.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
https://groups.google.com/forum/#%21topic/rubyonrails-security/CFRVkEytdP8 | |
https://lists.debian.org/debian-lts-announce/2021/07/msg00019.html | third party advisory mailing list |