You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Ruby on Rails is a full-stack web framework optimized for programmer happiness and sustainable productivity. It encourages beautiful code by favoring convention over configuration.
There is a possible denial of service vulnerability in Action View (Rails) <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 where specially crafted accept headers can cause action view to consume 100% cpu and make the server unresponsive.
CVE-2019-5419 - High Severity Vulnerability
Ruby on Rails is a full-stack web framework optimized for programmer happiness and sustainable productivity. It encourages beautiful code by favoring convention over configuration.
Library home page: https://rubygems.org/gems/rails-4.1.0.gem
Path to vulnerable library: /app1/Gemfile.lock,ms/2.5.0/cache/rails-4.1.0.gem
Dependency Hierarchy:
Found in HEAD commit: 9d946faa10e3050193fb56220287f7565773de83
There is a possible denial of service vulnerability in Action View (Rails) <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 where specially crafted accept headers can cause action view to consume 100% cpu and make the server unresponsive.
Publish Date: 2019-03-27
URL: CVE-2019-5419
Base Score Metrics:
Type: Upgrade version
Origin: https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/
Release Date: 2019-01-04
Fix Resolution: 4.2.11.1, 5.0.7.2, 5.1.6.2, 5.2.2.1
The text was updated successfully, but these errors were encountered: