CVE-2018-16477

A bypass vulnerability in Active Storage >= 5.2.0 for Google Cloud Storage and Disk services allow an attacker to modify the `content-disposition` and `content-type` parameters which can be used in with HTML files and have them executed inline. Additionally, if combined with other techniques such as cookie bombing and specially crafted AppCache manifests, an attacker can gain access to private signed URLs within a specific storage path. This vulnerability has been fixed in version 5.2.1.1.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
6.5 MEDIUM
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
hackeroneCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 49%
VendorProductVersion
rubyonrailsrails
5.2.0 ≤
𝑥
< 5.2.1.1
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
rails
bullseye (security)
2:6.0.3.7+dfsg-2+deb11u2
fixed
bullseye
2:6.0.3.7+dfsg-2+deb11u2
fixed
stretch
not-affected
jessie
not-affected
bookworm
2:6.1.7.3+dfsg-2~deb12u1
fixed
sid
2:6.1.7.3+dfsg-4
fixed
trixie
2:6.1.7.3+dfsg-4
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
rails
disco
not-affected
cosmic
not-affected
bionic
not-affected
xenial
not-affected
trusty
dne
rails-4.0
disco
dne
cosmic
dne
bionic
dne
xenial
dne
trusty
dne
ruby-actionpack-3.2
disco
dne
cosmic
dne
bionic
dne
xenial
dne
trusty
dne
ruby-activemodel-3.2
disco
dne
cosmic
dne
bionic
dne
xenial
dne
trusty
dne
ruby-activerecord-3.2
disco
dne
cosmic
dne
bionic
dne
xenial
dne
trusty
dne
ruby-activesupport-3.2
disco
dne
cosmic
dne
bionic
dne
xenial
dne
trusty
dne
ruby-rails-3.2
disco
dne
cosmic
dne
bionic
dne
xenial
dne
trusty
dne