CVE-2014-0130
KEV
🔴 Łataj teraz
Luka w Ruby on Rails umożliwia zdalnym atakującym odczyt dowolnych plików.
CVSS
7.5
EPSS
57.0%
Exploit
weaponized
Vendor
rubyonrails
Opis źródłowy (NVD)
Directory traversal vulnerability in actionpack/lib/abstract_controller/base.rb in the implicit-render implementation in Ruby on Rails before 3.2.18, 4.0.x before 4.0.5, and 4.1.x before 4.1.1, when certain route globbing configurations are enabled, allows remote attackers to read arbitrary files via a crafted request.
path-traversal
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.5 |
| CISA KEV (aktywnie wykorzystywane) | Tak |
| FIRST EPSS (prawdopodobieństwo exploita) | 57.0% |
| Opublikowano (NVD) | 2014-05-07 10:55:04 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-21 20:07:36 UTC |
Referencje
- http://matasano.com/research/AnatomyOfRailsVuln-CVE-2014-0130.pdf (secalert@redhat.com) [Broken Link, Technical Description]
- http://rhn.redhat.com/errata/RHSA-2014-1863.html (secalert@redhat.com) [Third Party Advisory]
- http://www.securityfocus.com/bid/67244 (secalert@redhat.com) [Broken Link, Third Party Advisory, VDB Entry]
- https://groups.google.com/forum/message/raw?msg=rubyonrails-security/NkKc7vTW70o/NxW_PDBSG3AJ (secalert@redhat.com) [Broken Link, Third Party Advisory]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-0130 (134c704f-9b21-4f2e-91b3-4a467353bcc0) [US Government Resource]