Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/rails@2:5.2.2.1%2Bdfsg-1?distro=trixie
purl pkg:deb/debian/rails@2:5.2.2.1%2Bdfsg-1?distro=trixie
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (3)
Vulnerability Summary Aliases
VCID-8dad-dvat-1fg4 Path Traversal in Action View # File Content Disclosure in Action View Impact ------ There is a possible file content disclosure vulnerability in Action View. Specially crafted accept headers in combination with calls to `render file:` can cause arbitrary files on the target server to be rendered, disclosing the file contents. The impact is limited to calls to `render` which render file contents without a specified accept format. Impacted code in a controller looks something like this: ``` ruby class UserController < ApplicationController def index render file: "#{Rails.root}/some/file" end end ``` Rendering templates as opposed to files is not impacted by this vulnerability. All users running an affected release should either upgrade or use one of the workarounds immediately. Releases -------- The 6.0.0.beta3, 5.2.2.1, 5.1.6.2, 5.0.7.2, and 4.2.11.1 releases are available at the normal locations. Workarounds ----------- This vulnerability can be mitigated by specifying a format for file rendering, like this: ``` ruby class UserController < ApplicationController def index render file: "#{Rails.root}/some/file", formats: [:html] end end ``` In summary, impacted calls to `render` look like this: ``` render file: "#{Rails.root}/some/file" ``` The vulnerability can be mitigated by changing to this: ``` render file: "#{Rails.root}/some/file", formats: [:html] ``` Other calls to `render` are not impacted. Alternatively, the following monkey patch can be applied in an initializer: ``` ruby $ cat config/initializers/formats_filter.rb # frozen_string_literal: true ActionDispatch::Request.prepend(Module.new do def formats super().select do |format| format.symbol || format.ref == "*/*" end end end) ``` Credits ------- Thanks to John Hawthorn <john@hawthorn.email> of GitHub CVE-2019-5418
GHSA-86g5-2wh3-gc9j
VCID-c8b5-d83n-nuhw Allocation of Resources Without Limits or Throttling There is a possible denial of service vulnerability in Action View (Rails) where specially crafted accept headers can cause action view to consume % cpu and make the server unresponsive. CVE-2019-5419
GHSA-m63j-wh5w-c252
VCID-zydu-j9dg-fqdb Improper Input Validation A remote code execution vulnerability in development mode Rails can allow an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit. CVE-2019-5420
GHSA-m42h-mh85-4qgc

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T11:34:19.634357+00:00 Debian Importer Fixing VCID-8dad-dvat-1fg4 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:47:59.796845+00:00 Debian Importer Fixing VCID-c8b5-d83n-nuhw https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:39:02.994004+00:00 Debian Importer Fixing VCID-zydu-j9dg-fqdb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T08:54:34.517880+00:00 Debian Importer Fixing VCID-8dad-dvat-1fg4 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:32:46.812221+00:00 Debian Importer Fixing VCID-c8b5-d83n-nuhw https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:25:22.470764+00:00 Debian Importer Fixing VCID-zydu-j9dg-fqdb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:51:47.517450+00:00 Debian Importer Fixing VCID-zydu-j9dg-fqdb https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:47.460573+00:00 Debian Importer Fixing VCID-c8b5-d83n-nuhw https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:51:47.404703+00:00 Debian Importer Fixing VCID-8dad-dvat-1fg4 https://security-tracker.debian.org/tracker/data/json 38.1.0