First published: Fri Nov 30 2018(Updated: )
A Broken Access Control vulnerability in Active Job versions >= 4.2.0 allows an attacker to craft user input which can cause Active Job to deserialize it using GlobalId and give them access to information that they should not have. This vulnerability has been fixed in versions 4.2.11, 5.0.7.1, 5.1.6.1, and 5.2.1.1.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rubyonrails Rails | >=4.2.0<4.2.11 | |
Rubyonrails Rails | >=5.0.0<5.0.7.1 | |
Rubyonrails Rails | >=5.1.0<5.1.6.1 | |
Rubyonrails Rails | >=5.2.0<5.2.1.1 | |
Redhat Cloudforms | =4.6 | |
redhat/activejob | <4.2.11 | 4.2.11 |
redhat/activejob | <5.0.7.1 | 5.0.7.1 |
redhat/activejob | <5.1.6.1 | 5.1.6.1 |
redhat/activejob | <5.2.1.1 | 5.2.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16476 is a Broken Access Control vulnerability in Active Job versions >= 4.2.0.
CVE-2018-16476 allows an attacker to craft user input that can give them unauthorized access to information in Active Job using GlobalId in Ruby on Rails.
CVE-2018-16476 has a severity rating of 7.5 (High).
To fix CVE-2018-16476, update to one of the following versions: 4.2.11, 5.0.7.1, 5.1.6.1, or 5.2.1.1.
You can find more information about CVE-2018-16476 on the following references: [link1], [link2], [link3].