Advisory Database
  • Advisories
  • Dependency Scanning
  1. gem
  2. ›
  3. actionpack
  4. ›
  5. CVE-2014-7829

CVE-2014-7829: Arbitrary file existence disclosure

November 18, 2014 (updated August 8, 2019)

Specially crafted requests can be used to determine whether a file exists on the filesystem that is outside the Rails application’s root directory. The files will not be served, but attackers can determine whether the file exists. This only impacts Rails applications that enable static file serving at runtime. For example, the application’s production configuration will say: config.serve_static_assets = true

References

  • weblog.rubyonrails.org/2014/11/19/Rails-4-0-11-1-and-4-1-7-1-have-been-released/
  • groups.google.com/forum/

Code Behaviors & Features

Detect and mitigate CVE-2014-7829 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 3.2.0a before 3.2.21, all versions starting from 4.0.0a before 4.0.11.1, all versions starting from 4.1.0a before 4.1.7.1

Fixed versions

  • 3.2.21
  • 4.0.11.1
  • 4.0.12
  • 4.1.7.1
  • 4.1.8

Solution

Upgrade to latest or use workaround; see provided link.

Impact 5 MEDIUM

AV:N/AC:L/Au:N/C:P/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Source file

gem/actionpack/CVE-2014-7829.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:16:08 +0000.