CVE-2018-16477

NameCVE-2018-16477
DescriptionA bypass vulnerability in Active Storage >= 5.2.0 for Google Cloud Storage and Disk services allow an attacker to modify the `content-disposition` and `content-type` parameters which can be used in with HTML files and have them executed inline. Additionally, if combined with other techniques such as cookie bombing and specially crafted AppCache manifests, an attacker can gain access to private signed URLs within a specific storage path.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium (attack range: remote)
Debian Bugs914848

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
rails (PTS)jessie (security), jessie2:4.1.8-1+deb8u4fixed
stretch2:4.2.7.1-1fixed
buster2:5.2.2+dfsg-6fixed
sid2:5.2.2.1+dfsg-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
railssource(unstable)2:5.2.2+dfsg-1medium914848
railssourcejessie(not affected)
railssourcestretch(not affected)

Notes

[stretch] - rails <not-affected> (Only affects >= 5.2.0; vulnerable code not present)
[jessie] - rails <not-affected> (Only affects >= 5.2.0; vulnerable code not present)
https://www.openwall.com/lists/oss-security/2018/11/27/5
Originally no version was affected until 2:5.2.0+dfsg-2 was uploaded to unstable.

Search for package or bug name: Reporting problems