Vulnerability Description
An issue was discovered in the rack-cors (aka Rack CORS Middleware) gem before 1.0.4 for Ruby. It allows ../ directory traversal to access private resources because resource matching does not ensure that pathnames are in a canonical format.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rack-Cors Project | Rack-Cors | < 1.0.4 |
| Debian | Debian Linux | 8.0 |
| Canonical | Ubuntu Linux | 16.04 |
Related Weaknesses (CWE)
References
- https://github.com/cyu/rack-cors/commit/e4d4fc362a4315808927011cbe5afcfe5486f17dPatchThird Party Advisory
- https://github.com/cyu/rack-cors/compare/v1.0.3...v1.0.4PatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2020/02/msg00004.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2020/10/msg00000.htmlMailing ListThird Party Advisory
- https://usn.ubuntu.com/4571-1/Third Party Advisory
- https://www.debian.org/security/2021/dsa-4918Third Party Advisory
- https://github.com/cyu/rack-cors/commit/e4d4fc362a4315808927011cbe5afcfe5486f17dPatchThird Party Advisory
- https://github.com/cyu/rack-cors/compare/v1.0.3...v1.0.4PatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2020/02/msg00004.htmlMailing ListThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2020/10/msg00000.htmlMailing ListThird Party Advisory
- https://usn.ubuntu.com/4571-1/Third Party Advisory
- https://www.debian.org/security/2021/dsa-4918Third Party Advisory
FAQ
What is CVE-2019-18978?
CVE-2019-18978 is a vulnerability with a CVSS score of 5.3 (MEDIUM). An issue was discovered in the rack-cors (aka Rack CORS Middleware) gem before 1.0.4 for Ruby. It allows ../ directory traversal to access private resources because resource matching does not ensure t...
How severe is CVE-2019-18978?
CVE-2019-18978 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-18978?
Check the references section above for vendor advisories and patch information. Affected products include: Rack-Cors Project Rack-Cors, Debian Debian Linux, Canonical Ubuntu Linux.