logo

CVE-2014-7819 sprockets

Package

Manager: gem
Name: sprockets
Vulnerable Version: >=0 <2.0.5 || >=2.1.0 <2.1.4 || >=2.2.0 <2.2.3 || >=2.3.0 <2.3.3 || >=2.4.0 <2.4.6 || >=2.5.0 <2.5.1 || >=2.6.0 <2.7.1 || >=2.8.0 <2.8.3 || >=2.9.0 <2.9.4 || >=2.10.0 <2.10.2 || >=2.11.0 <2.11.3 || >=2.12.0 <2.12.3

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N/E:P/RL:O/RC:C

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N

EPSS: 0.01371 pctl0.79497

Details

sprockets vulnerable to Path Traversal Multiple directory traversal vulnerabilities in `server.rb` in Sprockets before 2.0.5, 2.1.x before 2.1.4, 2.2.x before 2.2.3, 2.3.x before 2.3.3, 2.4.x before 2.4.6, 2.5.x before 2.5.1, 2.6.x and 2.7.x before 2.7.1, 2.8.x before 2.8.3, 2.9.x before 2.9.4, 2.10.x before 2.10.2, 2.11.x before 2.11.3, 2.12.x before 2.12.3, and 3.x before 3.0.0.beta.3, as distributed with Ruby on Rails 3.x and 4.x, allow remote attackers to determine the existence of files outside the application root via a ../ (dot dot slash) sequence with (1) double slashes or (2) URL encoding.

Metadata

Created: 2017-10-24T18:33:36Z
Modified: 2023-03-01T18:54:54Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2017/10/GHSA-33pp-3763-mrfp/GHSA-33pp-3763-mrfp.json
CWE IDs: ["CWE-22"]
Alternative ID: GHSA-33pp-3763-mrfp
Finding: F063
Auto approve: 1