CVE-2018-16477

EUVD-2018-0801
A bypass vulnerability in Active Storage >= 5.2.0 for Google Cloud Storage and Disk services allow an attacker to modify the `content-disposition` and `content-type` parameters which can be used in with HTML files and have them executed inline. Additionally, if combined with other techniques such as cookie bombing and specially crafted AppCache manifests, an attacker can gain access to private signed URLs within a specific storage path. This vulnerability has been fixed in version 5.2.1.1.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.5 MEDIUM
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 49%
Affected Products (NVD)
VendorProductVersion
rubyonrailsrails
5.2.0 ≤
𝑥
< 5.2.1.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
rails
bookworm
2:6.1.7.3+dfsg-2~deb12u1
fixed
bullseye
2:6.0.3.7+dfsg-2+deb11u2
fixed
bullseye (security)
2:6.0.3.7+dfsg-2+deb11u2
fixed
jessie
not-affected
sid
2:6.1.7.3+dfsg-4
fixed
stretch
not-affected
trixie
2:6.1.7.3+dfsg-4
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
rails
bionic
not-affected
cosmic
not-affected
disco
not-affected
trusty
dne
xenial
not-affected
rails-4.0
bionic
dne
cosmic
dne
disco
dne
trusty
dne
xenial
dne
ruby-actionpack-3.2
bionic
dne
cosmic
dne
disco
dne
trusty
dne
xenial
dne
ruby-activemodel-3.2
bionic
dne
cosmic
dne
disco
dne
trusty
dne
xenial
dne
ruby-activerecord-3.2
bionic
dne
cosmic
dne
disco
dne
trusty
dne
xenial
dne
ruby-activesupport-3.2
bionic
dne
cosmic
dne
disco
dne
trusty
dne
xenial
dne
ruby-rails-3.2
bionic
dne
cosmic
dne
disco
dne
trusty
dne
xenial
dne