Use of Insufficiently Random Values Affecting rmt-server package, versions <2.6.5-3.18.1
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-SLES151-RMTSERVER-2698703
- published 14 Apr 2022
- disclosed 5 Nov 2020
Introduced: 5 Nov 2020
CVE-2019-5420 Open this link in a new tabHow to fix?
Upgrade SLES:15.1 rmt-server to version 2.6.5-3.18.1 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream rmt-server package and not the rmt-server package as distributed by SLES.
See How to fix? for SLES:15.1 relevant fixed versions and status.
A remote code execution vulnerability in development mode Rails <5.2.2.1, <6.0.0.beta3 can allow an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.
References
- https://www.suse.com/security/cve/CVE-2019-5420.html
- https://bugzilla.suse.com/1129268
- https://bugzilla.suse.com/1203810
- https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/
- https://groups.google.com/forum/#!topic/rubyonrails-security/IsQKvDqZdKw
- http://packetstormsecurity.com/files/152704/Ruby-On-Rails-DoubleTap-Development-Mode-secret_key_base-Remote-Code-Execution.html
- https://www.exploit-db.com/exploits/46785/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/
- https://groups.google.com/forum/#%21topic/rubyonrails-security/IsQKvDqZdKw
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/
- https://www.exploit-db.com/exploits/46785