5.3
CVSSv3

CVE-2019-18978

Published: 14/11/2019 Updated: 21/05/2021
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

An issue exists in the rack-cors (aka Rack CORS Middleware) gem prior to 1.0.4 for Ruby. It allows ../ directory traversal to access private resources because resource matching does not ensure that pathnames are in a canonical format.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

rack-cors project rack-cors

debian debian linux 8.0

debian debian linux 9.0

debian debian linux 10.0

canonical ubuntu linux 16.04

Vendor Advisories

Debian Bug report logs - #944849 ruby-rack-cors: CVE-2019-18978 Package: src:ruby-rack-cors; Maintainer for src:ruby-rack-cors is Debian Ruby Extras Maintainers <pkg-ruby-extras-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Sat, 16 Nov 2019 10:24:02 UTC Severity: gr ...
Improper pathname handling in ruby-rack-cors, a middleware that makes Rack-based apps CORS compatible, may result in access to private resources For the stable distribution (buster), this problem has been fixed in version 102-1+deb10u1 We recommend that you upgrade your ruby-rack-cors packages For the detailed security status of ruby-rack-cors ...