First published: Fri Nov 30 2018(Updated: )
A bypass vulnerability in Active Storage >= 5.2.0 for Google Cloud Storage and Disk services allow an attacker to modify the `content-disposition` and `content-type` parameters which can be used in with HTML files and have them executed inline. Additionally, if combined with other techniques such as cookie bombing and specially crafted AppCache manifests, an attacker can gain access to private signed URLs within a specific storage path. This vulnerability has been fixed in version 5.2.1.1.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rubyonrails Rails | >=5.2.0<5.2.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-16477 is a bypass vulnerability in Active Storage >= 5.2.0 for Google Cloud Storage and Disk services.
An attacker can exploit CVE-2018-16477 by modifying the 'content-disposition' and 'content-type' parameters in HTML files to execute them inline.
By exploiting CVE-2018-16477, an attacker can execute malicious code inline within HTML files.
Active Storage versions 5.2.0 to 5.2.1.1 are affected by CVE-2018-16477.
Yes, it is recommended to update Active Storage to a version that is not affected by the vulnerability.