First published: Fri Jun 19 2020(Updated: )
A client side enforcement of server side security vulnerability exists in rails < 5.2.4.2 and rails < 6.0.3.1 ActiveStorage's S3 adapter that allows the Content-Length of a direct file upload to be modified by an end user bypassing upload limits.
Credit: support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
Rubyonrails Rails | <5.2.4.2 | |
Rubyonrails Rails | >=6.0.0<6.0.3.1 | |
Debian Debian Linux | =10.0 | |
debian/rails | 2:5.2.2.1+dfsg-1+deb10u3 2:5.2.2.1+dfsg-1+deb10u5 2:6.0.3.7+dfsg-2+deb11u2 2:6.1.7.3+dfsg-1 2:6.1.7.3+dfsg-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8162 is a client-side enforcement of server-side security vulnerability in Rails < 5.2.4.2 and Rails < 6.0.3.1 ActiveStorage's S3 adapter.
CVE-2020-8162 allows an end user to modify the Content-Length of a direct file upload, bypassing upload limits.
The severity of CVE-2020-8162 is not specified.
CVE-2020-8162 affects Rails < 5.2.4.2 and Rails < 6.0.3.1.
To fix CVE-2020-8162, you should update Rails to version 5.2.4.3 or 6.0.3.1 or later.