Directory traversal in Rack::Directory app bundled with Rack
Published: May 12, 2020
SECURITY IDENTIFIERS
- CVE: CVE-2020-8161 (NVD)
- GHSA: GHSA-5f9h-9pjv-v6j7
- Vendor Advisory: https://groups.google.com/forum/#!topic/ruby-security-ann/T4ZIsfRf2eA
GEM
SEVERITY
CVSS v3.x: 8.6 (High)
PATCHED VERSIONS
~> 2.1.3
>= 2.2.0
DESCRIPTION
There was a possible directory traversal vulnerability in the Rack::Directory app that is bundled with Rack.
Versions Affected: rack < 2.2.0 Not affected: Applications that do not use Rack::Directory. Fixed Versions: 2.1.3, >= 2.2.0
Impact
If certain directories exist in a director that is managed by
Rack::Directory, an attacker could, using this vulnerability, read the
contents of files on the server that were outside of the root specified in the
Rack::Directory initializer.
Workarounds
Until such time as the patch is applied or their Rack version is upgraded, we recommend that developers do not use Rack::Directory in their applications.
