Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Sprockets path traversal leads to information leak #10

Open
sniffler-app bot opened this issue Apr 14, 2023 · 0 comments
Open

Sprockets path traversal leads to information leak #10

sniffler-app bot opened this issue Apr 14, 2023 · 0 comments

Comments

@sniffler-app
Copy link

sniffler-app bot commented Apr 14, 2023

Description

Specially crafted requests can be used to access files that exist on the filesystem that is outside an application's root directory, when the Sprockets server is used in production.

All users running an affected release should either upgrade or use one of the work arounds immediately.

Workaround:

In Rails applications, work around this issue, set config.assets.compile = false and config.public_file_server.enabled = true in an initializer and precompile the assets.

This work around will not be possible in all hosting environments and upgrading is advised.

Informations

Manifest Path: Gemfile.lock

Please look at dependabot report :https://github.com/swipely/swipely-bss-oodd/security/dependabot/85

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant