There is an information leak vulnerability in Sprockets. Versions Affected: 4.0.0.beta7 and lower, 3.7.1 and lower, 2.12.4 and lower. Specially crafted requests can be used to access files that exists on the filesystem that is outside an application's root directory, when the Sprockets server is used in production. All users running an affected release should either upgrade or use one of the work arounds immediately.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1419-1 | ruby-sprockets security update |
Debian DSA |
DSA-4242-1 | ruby-sprockets security update |
Github GHSA |
GHSA-pr3h-jjhj-573x | Sprockets path traversal leads to information leak |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-09-16T18:39:20.968Z
Reserved: 2017-12-28T00:00:00
Link: CVE-2018-3760
No data.
Status : Modified
Published: 2018-06-26T19:29:00.343
Modified: 2024-11-21T04:06:01.503
Link: CVE-2018-3760
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Github GHSA