Improper Access Control Affecting kaminari package, versions >=0.15.0, <0.16.2


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.04% (11th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Improper Access Control vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUBY-KAMINARI-7148533
  • published28 May 2024
  • disclosed27 May 2024
  • creditGareth Jones

Introduced: 27 May 2024

CVE-2024-32978  (opens in a new tab)
CWE-276  (opens in a new tab)

How to fix?

Upgrade kaminari to version 0.16.2 or higher.

Overview

kaminari is a Scope & Engine based, clean, powerful, agnostic, customizable and sophisticated paginator for Rails 4+.

Affected versions of this package are vulnerable to Improper Access Control due to improper handling of file permissions. An attacker can modify application behavior or compromise data integrity by writing to specific Ruby files.

Note

Those who use the gem install command, such as gem install kaminari -v 0.16.1, gem unpack kaminari -v 0.16.1, or bundle install to download the package would not be affected and no action is required.

Those who manually download and decompressing the affected versions are advised to update to 0.16.2 or later version of Kaminari where file permissions have been adjusted to enhance security.

Workaround

If upgrading is not feasible immediately, manually adjusting the file permissions on the server to 644 to restrict access is a viable interim measure.

All Affected Versions:

lib/kaminari/models/page_scope_methods.rb

In addition to the previously mentioned file, security tools like AWS Inspector might also identify other files as unsafe. These files, although not loaded or used at runtime, may still be flagged. To avoid any potential confusion in your logs and ensure system integrity, it is recommended to update the permissions for these files as well. This proactive measure helps maintain a clean security posture and minimizes unnecessary alerts.

Version 0.15.0 and 0.15.1:

spec/models/mongo_mapper/mongo_mapper_spec.rb

Version 0.16.0:

spec/models/mongo_mapper/mongo_mapper_spec.rb spec/models/mongoid/mongoid_spec.rb

Version 0.16.1:

spec/models/active_record/scopes_spec.rb spec/models/mongo_mapper/mongo_mapper_spec.rb spec/models/mongoid/mongoid_spec.rb gemfiles/data_mapper_12.gemfile gemfiles/active_record_32.gemfile

References

CVSS Scores

version 3.1