CVE-2018-16477

NameCVE-2018-16477
DescriptionA bypass vulnerability in Active Storage >= 5.2.0 for Google Cloud Storage and Disk services allow an attacker to modify the `content-disposition` and `content-type` parameters which can be used in with HTML files and have them executed inline. Additionally, if combined with other techniques such as cookie bombing and specially crafted AppCache manifests, an attacker can gain access to private signed URLs within a specific storage path. This vulnerability has been fixed in version 5.2.1.1.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs914848

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
rails (PTS)bullseye (security), bullseye2:6.0.3.7+dfsg-2+deb11u2fixed
bookworm2:6.1.7.3+dfsg-2~deb12u1fixed
sid, trixie2:6.1.7.3+dfsg-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
railssourcejessie(not affected)
railssourcestretch(not affected)
railssource(unstable)2:5.2.2+dfsg-1914848

Notes

[stretch] - rails <not-affected> (Only affects >= 5.2.0; vulnerable code not present)
[jessie] - rails <not-affected> (Only affects >= 5.2.0; vulnerable code not present)
https://www.openwall.com/lists/oss-security/2018/11/27/5
Originally no version was affected until 2:5.2.0+dfsg-2 was uploaded to unstable.

Search for package or bug name: Reporting problems