HTTP: Directory Traversal Detected on HTTP Accept Header
This signature detects attempts to exploit a known flaw in HTTP accept header. A successful attack can result in directory traversal attacks.
Extended Description
There is a File Content Disclosure vulnerability in Action View <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 and v3 where specially crafted accept headers can cause contents of arbitrary files on the target system's filesystem to be exposed.
Affected Products
Rubyonrails rails
References
BugTraq: 107409
CVE: CVE-2019-5418
URL: https://security.berkeley.edu/news/critical-file-content-disclosure-dos-vulnerabilities-ruby-rails-cve-2019-5418 https://devcentral.f5.com/s/articles/ruby-on-rails-arbitrary-file-read-cve-2019-5418-34022 https://groups.google.com/forum/#!topic/rubyonrails-security/pfrki96sm8q
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Opensuse
Fedoraproject
Rubyonrails
Redhat
Debian
5.0