Name | CVE-2018-16476 |
Description | A Broken Access Control vulnerability in Active Job versions >= 4.2.0 allows an attacker to craft user input which can cause Active Job to deserialize it using GlobalId and give them access to information that they should not have. This vulnerability has been fixed in versions 4.2.11, 5.0.7.1, 5.1.6.1, and 5.2.1.1. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 914847 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
rails (PTS) | jessie, jessie (lts) | 2:4.1.8-1+deb8u9 | fixed |
stretch (security), stretch (lts), stretch | 2:4.2.7.1-1+deb9u5 | fixed | |
buster (security), buster, buster (lts) | 2:5.2.2.1+dfsg-1+deb10u5 | fixed | |
bullseye (security), bullseye | 2:6.0.3.7+dfsg-2+deb11u2 | fixed | |
bookworm | 2:6.1.7.3+dfsg-2~deb12u1 | fixed | |
sid, trixie | 2:6.1.7.3+dfsg-4 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
rails | source | jessie | (not affected) | |||
rails | source | stretch | 2:4.2.7.1-1+deb9u1 | |||
rails | source | (unstable) | 2:5.2.2+dfsg-1 | 914847 |
[jessie] - rails <not-affected> (only affects >= 4.2.0)
https://www.openwall.com/lists/oss-security/2018/11/27/4