Description
A remote code execution vulnerability in development mode Rails <5.2.2.1, <6.0.0.beta3 can allow an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-m42h-mh85-4qgc | Use of Insufficiently Random Values in Railties Allows Remote Code Execution |
References
History
No history.
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-08-04T19:54:53.584Z
Reserved: 2019-01-04T00:00:00.000Z
Link: CVE-2019-5420
No data.
Status : Modified
Published: 2019-03-27T14:29:01.720
Modified: 2024-11-21T04:44:54.150
Link: CVE-2019-5420
OpenCVE Enrichment
No data.
Github GHSA