漏洞描述 Ruby On Rails在开发环境下使用Sprockets作为静态文件服务器,Ruby On Rails是著名RubyWeb开发框架,Sprockets是编译及分发静态资源文件的Ruby库。</br>Sprockets3.7.1及之前版本中,存在一处因为二次解码导致的路径穿越漏洞,攻击者可以利用%252e%252e/来跨越到根目录,读取或执行目标服务器上任意文件。
相关漏洞推荐 POC CVE-2015-3224: Ruby on Rails Web Console - Remote Code Execution POC CVE-2018-3760: Ruby On Rails - Local File Inclusion POC CVE-2019-5418: Rails File Content Disclosure POC CVE-2020-8163: Ruby on Rails <5.0.1 - Remote Code Execution POC CVE-2021-33564: Ruby Dragonfly <1.4.0 - Remote Code Execution POC CVE-2018-3760: Ruby On Rails Path Traversal POC CVE-2019-5418: Rails File Content Disclosure POC privesc-ruby: Ruby - Privilege Escalation POC cmdi-ruby-open-rce: Ruby Kernel#open/URI.open RCE POC ruby-on-rails-framework-exceptions: Ruby on Rails Framework Exceptions POC rails-database-config: Ruby on Rails Database Configuration File - Detect POC environment-rb: Environment Ruby File Disclosure POC rails-secret-token-disclosure: Ruby on Rails Secret Token Disclosure