CVE-2026-33195
🟠 Łataj w tym tygodniu
Brak walidacji ścieżki w Active Storage pozwala na atak typu traversal i dostęp do plików serwera.
CVSS
9.8
EPSS
0.0%
Exploit
none
Vendor
rubyonrails
Opis źródłowy (NVD)
Active Storage allows users to attach cloud and local files in Rails applications. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, Active Storage's `DiskService#path_for` does not validate that the resolved filesystem path remains within the storage root directory. If a blob key containing path traversal sequences (e.g. `../`) is used, it could allow reading, writing, or deleting arbitrary files on the server. Blob keys are expected to be trusted strings, but some applications could be passing user input as keys and would be affected. Versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 contain a patch.
path-traversal
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.8 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 0.0% |
| Opublikowano (NVD) | 2026-03-24 00:16:28 UTC |
| Ostatnia modyfikacja (NVD) | 2026-03-24 17:55:45 UTC |
Referencje
- https://github.com/rails/rails/commit/4933c1e3b8c1bb04925d60347be9f69270392f2c (security-advisories@github.com) [Patch]
- https://github.com/rails/rails/commit/9b06fbc0f504b8afe333f33d19548f3b85fbe655 (security-advisories@github.com) [Patch]
- https://github.com/rails/rails/commit/a290c8a1ec189d793aa6d7f2570b6a763f675348 (security-advisories@github.com) [Patch]
- https://github.com/rails/rails/releases/tag/v7.2.3.1 (security-advisories@github.com) [Release Notes]
- https://github.com/rails/rails/releases/tag/v8.0.4.1 (security-advisories@github.com) [Release Notes]
- https://github.com/rails/rails/releases/tag/v8.1.2.1 (security-advisories@github.com) [Release Notes]
- https://github.com/rails/rails/security/advisories/GHSA-9xrj-h377-fr87 (security-advisories@github.com) [Vendor Advisory]