A directory traversal vulnerability exists in rack < 2.2.0 that allows an attacker perform directory traversal vulnerability in the Rack::Directory app that is bundled with Rack which could result in information disclosure.
References
| Link | Resource |
|---|---|
| https://groups.google.com/g/rubyonrails-security/c/IOO1vNZTzPA | Mailing List Patch Third Party Advisory |
| https://hackerone.com/reports/434404 | Permissions Required Third Party Advisory |
| https://lists.debian.org/debian-lts-announce/2020/07/msg00006.html | Mailing List Third Party Advisory |
| https://usn.ubuntu.com/4561-1/ | Third Party Advisory |
Information
Published : 2020-07-02 19:15
Updated : 2022-05-24 15:56
NVD link : CVE-2020-8161
Mitre link : CVE-2020-8161
JSON object : View
Products Affected
canonical
- ubuntu_linux
rack_project
- rack
debian
- debian_linux
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
