CVE-2019-5420
27.03.2019, 14:29
A remote code execution vulnerability in development mode Rails <5.2.2.1, <6.0.0.beta3 can allow an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.
Vendor | Product | Version |
---|---|---|
rubyonrails | rails | 𝑥 < 5.2.2.1 |
rubyonrails | rails | 6.0.0:beta1 |
rubyonrails | rails | 6.0.0:beta2 |
debian | debian_linux | 8.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
rails |
| ||||||||||||
rails-4.0 |
| ||||||||||||
ruby-actionpack-3.2 |
| ||||||||||||
ruby-activemodel-3.2 |
| ||||||||||||
ruby-activerecord-3.2 |
| ||||||||||||
ruby-activesupport-3.2 |
| ||||||||||||
ruby-rails-3.2 |
|
Common Weakness Enumeration
- CWE-77 - Improper Neutralization of Special Elements used in a Command ('Command Injection')The software constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
- CWE-330 - Use of Insufficiently Random ValuesThe software uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.
References