You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A client side enforcement of server side security vulnerability exists in rails < 5.2.4.2 and rails < 6.0.3.1 ActiveStorage's S3 adapter that allows the Content-Length of a direct file upload to be modified by an end user bypassing upload limits.
CVE-2020-8162 - High Severity Vulnerability
Attach cloud and local files in Rails applications.
Library home page: https://rubygems.org/gems/activestorage-5.2.4.2.gem
Path to vulnerable library: /xinfei-presenze/vendor/cache/activestorage-5.2.4.2.gem
Dependency Hierarchy:
Found in HEAD commit: 144a3471e80296517fe922af0a5339e47902390b
A client side enforcement of server side security vulnerability exists in rails < 5.2.4.2 and rails < 6.0.3.1 ActiveStorage's S3 adapter that allows the Content-Length of a direct file upload to be modified by an end user bypassing upload limits.
Publish Date: 2020-06-19
URL: CVE-2020-8162
Base Score Metrics:
Type: Upgrade version
Origin: GHSA-m42x-37p3-fv5w
Release Date: 2020-05-31
Fix Resolution: 5.2.4.3,6.0.3.1
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: