RULE(RULE ID:331182)

Rule General Information
Release Date: 2020-09-17
Rule Name: Ruby on Rails ActiveStorage Insecure Deserialization Vulnerability (CVE-2019-5420)
Severity:
CVE ID:
Rule Protection Details
Description: A remote code execution vulnerability in development mode Rails <5.2.2.1, <6.0.0.beta3 can allow an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.
Impact: An attacker could exploit this vulnerability to have unspecified effect.
Affected OS: Windows, Linux, Others
Reference: ExploitDB:46785
http://packetstormsecurity.com/files/152704/Ruby-On-Rails-DoubleTap-Development-Mode-secret_key_base-Remote-Code-Execution.html
https://groups.google.com/forum/#!topic/rubyonrails-security/IsQKvDqZdKw
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/
Solutions
The vendors have released upgrade patches to fix vulnerabilities, please visit:
https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/