CVE-2018-16476 High Severity Vulnerability detected by WhiteSource
mend-bolt-for-github opened this issue · 1 comments
CVE-2018-16476 - High Severity Vulnerability
Vulnerable Library - rails-4.2.5.gem
Ruby on Rails is a full-stack web framework optimized for programmer happiness and sustainable productivity. It encourages beautiful code by favoring convention over configuration.
path: /gems/2.3.0/cache/rails-4.2.5.gem
Library home page: https://rubygems.org/gems/rails-4.2.5.gem
Dependency Hierarchy:
- ❌ rails-4.2.5.gem (Vulnerable Library)
Vulnerability Details
A Broken Access Control vulnerability in Active Job versions >= 4.2.0 allows an attacker to craft user input which can cause Active Job to deserialize it using GlobalId and give them access to information that they should not have.
Publish Date: 2018-11-30
URL: CVE-2018-16476
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Origin: https://groups.google.com/forum/#!msg/rubyonrails-security/FL4dSdzr2zw/zjKVhF4qBAAJ
Release Date: 2019-02-09
Fix Resolution: 4.2.11, 5.0.7.1, 5.1.6.1, 5.2.1.1
Step up your Open Source Security Game with WhiteSource here