7.8
CWE
400 770 20
Advisory Published
Advisory Published
CVE Published
Updated

CVE-2019-5419: Input Validation

First published: Wed Mar 13 2019(Updated: )

# Denial of Service Vulnerability in Action View Impact ------ Specially crafted accept headers can cause the Action View template location code to consume 100% CPU, causing the server unable to process requests. This impacts all Rails applications that render views. All users running an affected release should either upgrade or use one of the workarounds immediately. Releases -------- The 6.0.0.beta3, 5.2.2.1, 5.1.6.2, 5.0.7.2, and 4.2.11.1 releases are available at the normal locations. Workarounds ----------- This vulnerability can be mitigated by wrapping `render` calls with `respond_to` blocks. For example, the following example is vulnerable: ``` ruby class UserController < ApplicationController def index render "index" end end ``` But the following code is not vulnerable: ```ruby class UserController < ApplicationController def index respond_to |format| format.html { render "index" } end end end ``` Implicit rendering is impacted, so this code is vulnerable: ```ruby class UserController < ApplicationController def index end end ``` But can be changed this this: ```ruby class UserController < ApplicationController def index respond_to |format| format.html { render "index" } end end end ``` Alternatively to specifying the format, the following monkey patch can be applied in an initializer: ``` $ cat config/initializers/formats_filter.rb # frozen_string_literal: true ActionDispatch::Request.prepend(Module.new do def formats super().select do |format| format.symbol || format.ref == "*/*" end end end) ``` Please note that only the 5.2.x, 5.1.x, 5.0.x, and 4.2.x series are supported at present. Users of earlier unsupported releases are advised to upgrade as soon as possible as we cannot guarantee the continued availability of security fixes for unsupported releases. Also note that the patches for this vulnerability are the same as CVE-2019-5418. Credits ------- Thanks to John Hawthorn <john@hawthorn.email> of GitHub

Credit: support@hackerone.com support@hackerone.com support@hackerone.com

Affected SoftwareAffected VersionHow to fix
redhat/ansible-tower<0:3.4.3-1.el7a
0:3.4.3-1.el7a
redhat/cfme<0:5.10.3.3-1.el7cf
0:5.10.3.3-1.el7cf
redhat/cfme-amazon-smartstate<0:5.10.3.3-1.el7cf
0:5.10.3.3-1.el7cf
redhat/cfme-appliance<0:5.10.3.3-1.el7cf
0:5.10.3.3-1.el7cf
redhat/cfme-gemset<0:5.10.3.3-1.el7cf
0:5.10.3.3-1.el7cf
redhat/cfme<0:5.9.9.3-1.el7cf
0:5.9.9.3-1.el7cf
redhat/cfme-amazon-smartstate<0:5.9.9.3-1.el7cf
0:5.9.9.3-1.el7cf
redhat/cfme-appliance<0:5.9.9.3-1.el7cf
0:5.9.9.3-1.el7cf
redhat/cfme-gemset<0:5.9.9.3-1.el7cf
0:5.9.9.3-1.el7cf
redhat/rh-ror50-rubygem-actionpack<1:5.0.1-2.el6
1:5.0.1-2.el6
redhat/rh-ror42-rubygem-actionpack<1:4.2.6-5.el6
1:4.2.6-5.el6
redhat/rh-ror50-rubygem-actionpack<1:5.0.1-2.el7
1:5.0.1-2.el7
redhat/rh-ror42-rubygem-actionpack<1:4.2.6-5.el7
1:4.2.6-5.el7
Rubyonrails Rails<4.2.11.1
Rubyonrails Rails>=5.0.0<5.0.7.2
Rubyonrails Rails>=5.1.0<5.1.6.2
Rubyonrails Rails>=5.2.0<5.2.2.1
Debian Debian Linux=8.0
Redhat Cloudforms=4.6
Redhat Cloudforms=4.7
Redhat Software Collections=1.0
openSUSE Leap=15.0
openSUSE Leap=15.1
Fedoraproject Fedora=30
rubygems/actionview>=6.0.0.beta1<6.0.0.beta3
6.0.0.beta3
rubygems/actionview>=5.2.0<=5.2.2.0
5.2.2.1
rubygems/actionview>=4.0.0<=4.2.11.0
4.2.11.1
rubygems/actionview>=5.0.0<=5.0.7.1
5.0.7.2
rubygems/actionview>=5.1.0<=5.1.6.1
5.1.6.2
redhat/rubygem-actionview<6.0.0.
6.0.0.
redhat/rubygem-actionview<5.2.2.1
5.2.2.1
redhat/rubygem-actionview<5.1.6.2
5.1.6.2
redhat/rubygem-actionview<5.0.7.2
5.0.7.2
redhat/rubygem-actionview<4.2.11.1
4.2.11.1
<4.2.11.1
>=5.0.0<5.0.7.2
>=5.1.0<5.1.6.2
>=5.2.0<5.2.2.1
=8.0
=4.6
=4.7
=1.0
=15.0
=15.1
=30

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Reference Links

Parent vulnerabilities

(Appears in the following advisories)

Frequently Asked Questions

  • What is CVE-2019-5419?

    CVE-2019-5419 is a denial of service vulnerability in Action View, a component of Ruby on Rails.

  • What is the impact of CVE-2019-5419?

    CVE-2019-5419 can cause the server to consume 100% CPU, rendering it unable to process requests.

  • Which version of Action View is affected by CVE-2019-5419?

    Action View versions <5.2.2.1, <5.1.6.2, and <5.0.7 are affected by CVE-2019-5419.

  • How can I fix CVE-2019-5419?

    To fix CVE-2019-5419, upgrade to Action View version 6.0.0.beta3, 5.2.2.1, 5.1.6.2, or apply the appropriate patch.

  • Where can I find more information about CVE-2019-5419?

    You can find more information about CVE-2019-5419 on the CVE website and NIST National Vulnerability Database.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203