HTTP: Ruby On Rails ActiveStorage Insecure Deserialization
This signature detects attempts to exploit a known vulnerability against Ruby on Rails. This vulnerability is due to deserializing a Ruby object within an HTTP URL using Marshal.load() without sufficient validation. A remote unauthenticated attacker can exploit this vulnerability by sending crafted HTTP requests embedding malicious serialized objects to a vulnerable application. Successful exploitation would result in arbitrary code execution under the security context on the affected Ruby on Rails application.
Extended Description
A remote code execution vulnerability in development mode Rails <5.2.2.1, <6.0.0.beta3 can allow an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.
Affected Products
Rubyonrails rails
References
CVE: CVE-2019-5420
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Fedoraproject
Rubyonrails
Debian
7.5