CVE-2019-5420

A remote code execution vulnerability in development mode Rails <5.2.2.1, <6.0.0.beta3 can allow an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:6.0.0:beta1:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:6.0.0:beta2:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*

History

03 Nov 2021, 18:19

Type Values Removed Values Added
CWE CWE-20 CWE-330
References (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/ - Third Party Advisory (FEDORA) https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/ - Mailing List, Third Party Advisory

Information

Published : 2019-03-27 14:29

Updated : 2024-02-04 20:20


NVD link : CVE-2019-5420

Mitre link : CVE-2019-5420

CVE.ORG link : CVE-2019-5420


JSON object : View

Products Affected

rubyonrails

  • rails

debian

  • debian_linux

fedoraproject

  • fedora
CWE
CWE-330

Use of Insufficiently Random Values

CWE-77

Improper Neutralization of Special Elements used in a Command ('Command Injection')