AI description
Automated description summarized from trusted sources.
CVE-2019-5418 is a file content disclosure vulnerability that exists in Action View versions less than 5.2.2.1, 5.1.6.2, 5.0.7.2, 4.2.11.1, and v3. It occurs when specially crafted accept headers, combined with calls to `render file`, can cause arbitrary files on the target server to be rendered, leading to the disclosure of their contents. An attacker can exploit this vulnerability by sending a request with a manipulated "Accept" header. This can allow the attacker to access sensitive files on the server's filesystem.
- Description
- There is a File Content Disclosure vulnerability in Action View <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 and v3 where specially crafted accept headers can cause contents of arbitrary files on the target system's filesystem to be exposed.
- Source
- support@hackerone.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Data from CISA
- Vulnerability name
- Rails Ruby on Rails Path Traversal Vulnerability
- Exploit added on
- Jul 7, 2025
- Exploit action due
- Jul 28, 2025
- Required action
- Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- support@hackerone.com
- CWE-22
- nvd@nist.gov
- NVD-CWE-noinfo
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "2A096CE2-193C-4132-B48D-12122D60FA07",
"versionEndExcluding": "4.2.11.1",
"versionStartIncluding": "3.0.0"
},
{
"criteria": "cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "5DCD16B7-B3E7-4EE4-B8B1-B25FBE75EFFF",
"versionEndExcluding": "5.0.7.2",
"versionStartIncluding": "5.0.0"
},
{
"criteria": "cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "EF0BA3C0-E2A4-4FE1-B443-308B7EFA32F2",
"versionEndExcluding": "5.1.6.2",
"versionStartIncluding": "5.1.0"
},
{
"criteria": "cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F248A4DE-4B0C-4E4C-AB38-C08F90B197F8",
"versionEndExcluding": "5.2.2.1",
"versionStartIncluding": "5.2.0"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:cloudforms:4.7:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "04AC556D-D511-4C4C-B9FB-A089BB2FEFD5"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:opensuse:leap:15.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F1E78106-58E6-4D59-990F-75DA575BFAD9"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "97A4B8DF-58DA-4AB6-A1F9-331B36409BA3"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:redhat:cloudforms:4.6:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "67F7263F-113D-4BAE-B8CB-86A61531A2AC"
},
{
"criteria": "cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9D7EE4B6-A6EC-4B9B-91DF-79615796673F"
}
],
"operator": "OR"
}
]
}
]