CVE-2018-3760 – sprockets
Package
Manager: gem
Name: sprockets
Vulnerable Version: >=3.0.0 <3.7.2 || >=4.0.0.beta1 <4.0.0.beta8 || >=0 <2.12.5
Severity
Level: High
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.93243 pctl0.99794
Details
Sprockets path traversal leads to information leak Specially crafted requests can be used to access files that exist on the filesystem that is outside an application's root directory, when the Sprockets server is used in production. All users running an affected release should either upgrade or use one of the work arounds immediately. ### Workaround: In Rails applications, work around this issue, set `config.assets.compile = false` and `config.public_file_server.enabled = true` in an initializer and precompile the assets. This work around will not be possible in all hosting environments and upgrading is advised.
Metadata
Created: 2018-06-20T22:18:58Z
Modified: 2023-09-05T21:05:18Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2018/06/GHSA-pr3h-jjhj-573x/GHSA-pr3h-jjhj-573x.json
CWE IDs: ["CWE-200", "CWE-22"]
Alternative ID: GHSA-pr3h-jjhj-573x
Finding: F063
Auto approve: 1