Revision Date: | 2014-11-08 | Version: | 1 | Title: | CVE-2014-7818 on Ubuntu 16.04 LTS (xenial) - low. | Description: | Directory traversal vulnerability in actionpack/lib/action_dispatch/middleware/static.rb in Action Pack in Ruby on Rails 3.x before 3.2.20, 4.0.x before 4.0.11, 4.1.x before 4.1.7, and 4.2.x before 4.2.0.beta3, when serve_static_assets is enabled, allows remote attackers to determine the existence of files outside the application root via a /..%2F sequence.
| Family: | unix | Class: | vulnerability | Status: | | Reference(s): | CVE-2014-7818
| Platform(s): | Ubuntu 16.04 LTS
| Product(s): | | Definition Synopsis | Ubuntu 16.04 LTS (xenial) is installed. AND Package Information
NOT rails package in xenial, while related to the CVE in some way, is not affected (note: 'contains no code').
OR NOT ruby-actionmailer package in xenial, while related to the CVE in some way, is not affected (note: 'contains no code').
OR NOT ruby-actionpack package in xenial, while related to the CVE in some way, is not affected (note: 'contains no code').
OR NOT ruby-actionview package in xenial, while related to the CVE in some way, is not affected (note: 'contains no code').
OR NOT ruby-activejob package in xenial, while related to the CVE in some way, is not affected (note: 'contains no code').
OR NOT ruby-activemodel package in xenial, while related to the CVE in some way, is not affected (note: 'contains no code').
OR NOT ruby-activerecord package in xenial, while related to the CVE in some way, is not affected (note: 'contains no code').
OR NOT ruby-activesupport package in xenial, while related to the CVE in some way, is not affected (note: 'contains no code').
OR NOT ruby-rails package in xenial, while related to the CVE in some way, is not affected (note: 'contains no code').
OR NOT ruby-railties package in xenial, while related to the CVE in some way, is not affected (note: 'contains no code').
|
|