CVE-2019-5418
Summary
| CVE | CVE-2019-5418 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2019-03-27 14:29:00 UTC |
| Updated | 2023-11-07 03:11:00 UTC |
| Description | There is a File Content Disclosure vulnerability in Action View <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 and v3 where specially crafted accept headers can cause contents of arbitrary files on the target system's filesystem to be exposed. |
Risk And Classification
EPSS: 0.943180000 probability, percentile 0.999500000 (date 2026-04-01)
CISA KEV: Listed on 2025-07-07; due 2025-07-28; ransomware use Unknown
Problem Types: NVD-CWE-noinfo
CISA Known Exploited Vulnerability
| Vendor | Rails |
|---|---|
| Product | Ruby on Rails |
| Name | Rails Ruby on Rails Path Traversal Vulnerability |
| Required Action | Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. |
| Notes | https://web.archive.org/web/20190313201629/https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/ ; https://nvd.nist.gov/vuln/detail/CVE-2019-5418 |
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Debian | Debian Linux | 8.0 | All | All | All |
| Operating System | Debian | Debian Linux | 8.0 | All | All | All |
| Operating System | Fedoraproject | Fedora | 30 | All | All | All |
| Operating System | Fedoraproject | Fedora | 30 | All | All | All |
| Operating System | Opensuse | Leap | 15.0 | All | All | All |
| Operating System | Opensuse | Leap | 15.0 | All | All | All |
| Application | Redhat | Cloudforms | 4.6 | All | All | All |
| Application | Redhat | Cloudforms | 4.7 | All | All | All |
| Application | Redhat | Cloudforms | 4.6 | All | All | All |
| Application | Redhat | Cloudforms | 4.7 | All | All | All |
| Application | Redhat | Software Collections | 1.0 | All | All | All |
| Application | Redhat | Software Collections | 1.0 | All | All | All |
| Application | Rubyonrails | Rails | All | All | All | All |
| Application | Rubyonrails | Rails | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Google Groups | CONFIRM | groups.google.com | Exploit, Mitigation, Patch, Third Party Advisory |
| [SECURITY] [DLA 1739-1] rails security update | MLIST | lists.debian.org | Mailing List, Third Party Advisory |
| Red Hat Customer Portal | REDHAT | access.redhat.com | Third Party Advisory |
| [SECURITY] Fedora 30 Update: rubygem-activemodel-5.2.3-2.fc30 - package-announce - Fedora Mailing-Lists | lists.fedoraproject.org | ||
| Rails 5.2.1 - Arbitrary File Content Disclosure - Multiple webapps Exploit | EXPLOIT-DB | www.exploit-db.com | Exploit, Third Party Advisory, VDB Entry |
| [security-announce] openSUSE-SU-2019:1344-1: moderate: Security update f | SUSE | lists.opensuse.org | Mailing List, Third Party Advisory |
| Red Hat Customer Portal | REDHAT | access.redhat.com | Third Party Advisory |
| Rails 5.2.1 Arbitrary File Content Disclosure ≈ Packet Storm | MISC | packetstormsecurity.com | Exploit, Third Party Advisory, VDB Entry |
| Rails 4.2.11.1, 5.0.7.2, 5.1.6.2, 5.2.2.1, and 6.0.0.beta3 have been released! | Riding Rails | CONFIRM | weblog.rubyonrails.org | Patch, Vendor Advisory |
| [SECURITY] Fedora 30 Update: rubygem-activemodel-5.2.3-2.fc30 - package-announce - Fedora Mailing-Lists | FEDORA | lists.fedoraproject.org | Mailing List, Third Party Advisory |
| Red Hat Customer Portal | REDHAT | access.redhat.com | Third Party Advisory |
| Google Groups | groups.google.com | ||
| Red Hat Customer Portal | REDHAT | access.redhat.com | Third Party Advisory |
| oss-security - [CVE-2019-5418] Amendment: Possible Remote Code Execution Exploit in Action View | MLIST | www.openwall.com | Mailing List, Mitigation, Patch, Third Party Advisory |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
| CISA Known Exploited Vulnerabilities catalog | CISA | www.cisa.gov | kev |
No vendor comments have been submitted for this CVE.