Advisory Database
  • Advisories
  • Dependency Scanning
  1. gem
  2. ›
  3. actionpack
  4. ›
  5. CVE-2014-7818

CVE-2014-7818: Arbitrary file existence disclosure

November 8, 2014 (updated August 8, 2019)

Specially crafted requests can be used to determine whether a file exists on the filesystem that is outside the Rails application’s root directory. The files will not be served, but attackers can determine whether the file exists. This only impacts Rails applications that enable static file serving at runtime. For example, the application’s production configuration will say: config.serve_static_assets = true

References

  • groups.google.com/forum/

Code Behaviors & Features

Detect and mitigate CVE-2014-7818 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 3.2.0a before 3.2.20, all versions starting from 4.0.0a before 4.0.11, all versions starting from 4.1.0a before 4.1.7, all versions starting from 4.2.0.a before 4.2.0.beta3

Fixed versions

  • 3.2.20
  • 4.0.11
  • 4.1.7
  • 4.2.0.beta3

Solution

Upgrade to latest or use workaround; see provided link.

Impact 4.3 MEDIUM

AV:N/AC:M/Au:N/C:P/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Source file

gem/actionpack/CVE-2014-7818.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:06 +0000.