Sha256: 16d977c63522a4880a43cd627ca1d85ccfcc4ef120056eda26940c36ea2e779b
Contents?: true
Size: 1.05 KB
Versions: 1
Compression:
Stored size: 1.05 KB
Contents
--- gem: activestorage framework: rails cve: 2020-8162 url: https://groups.google.com/forum/#!topic/rubyonrails-security/PjU3946mreQ title: Circumvention of file size limits in ActiveStorage date: 2020-05-18 description: | There is a vulnerability in ActiveStorage's S3 adapter that allows the Content-Length of a direct file upload to be modified by an end user. Versions Affected: rails < 5.2.4.2, rails < 6.0.3.1 Not affected: Applications that do not use the direct upload functionality of the ActiveStorage S3 adapter. Fixed Versions: rails >= 5.2.4.3, rails >= 6.0.3.1 Impact ------ Utilizing this vulnerability, an attacker can control the Content-Length of an S3 direct upload URL without receiving a new signature from the server. This could be used to bypass controls in place on the server to limit upload size. Workarounds ----------- This is a low-severity security issue. As such, no workaround is necessarily until such time as the application can be upgraded. patched_versions: - "~> 5.2.4.3" - ">= 6.0.3.1"
Version data entries
1 entries across 1 versions & 1 rubygems
Version | Path |
---|---|
bundler-audit-0.7.0.1 | data/ruby-advisory-db/gems/activestorage/CVE-2020-8162.yml |