漏洞描述 Ruby On Rails在开发环境下使用Sprockets作为静态文件服务器,Ruby On Rails是著名RubyWeb开发框架,Sprockets是编译及分发静态资源文件的Ruby库。</br>Sprockets3.7.1及之前版本中,存在一处因为二次解码导致的路径穿越漏洞,攻击者可以利用%252e%252e/来跨越到根目录,读取或执行目标服务器上任意文件。
相关漏洞推荐 CVE-2018-3760: Ruby On Rails Path Traversal POC 2025-09-01 | Ruby On Rails Ruby On Rails在开发环境下使用Sprockets作为静态文件服务器,Ruby On Rails是著名Ruby Web开发框架,Sprockets是编译及分发静态资源文件的Ruby库。 Sp... CVE-2015-3224: Ruby on Rails Web Console - Remote Code Execution POC 2025-08-01 | Ruby on Rails Ruby on Rails Web Console before 2.1.3, as used with Ruby on Rails 3.x and 4.x, does not properly re... CVE-2018-3760: Ruby On Rails - Local File Inclusion POC 2025-08-01 | Ruby On Rails Ruby On Rails is vulnerable to local file inclusion caused by secondary decoding in Sprockets 3.7.1 ... CVE-2018-1000600: Pre-auth Fully-responded SSRF POC 2025-09-01 | Pre-auth A exposure of sensitive information vulnerability exists in Jenkins GitHub Plugin 1.29.1 and earlier... CVE-2018-1000861: Jenkins 2.138 Remote Command Execution POC 2025-09-01 | Jenkins A code execution vulnerability exists in the Stapler web framework used by Jenkins 2.153 and earlier...