Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
Severity
9.8CRITICALNVD
EPSS
93.7%
top 0.15%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedMar 27
Latest updateMay 2

Description

A remote code execution vulnerability in development mode Rails <5.2.2.1, <6.0.0.beta3 can allow an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages3 packages

NVDrubyonrails/rails< 5.2.2.1+1
Debianrubyonrails/rails< 2:5.2.2.1+dfsg-1+3
CVEListV5rails/https_github.com_rails_rails5.2.2.1, 6.0.0.beta3+1

Also affects: Debian Linux 8.0, Fedora 30

Patches

🔴Vulnerability Details

4
OSV
CVE-2019-5420: A remote code execution vulnerability in development mode Rails <52019-03-27
CVEList
CVE-2019-5420: A remote code execution vulnerability in development mode Rails <52019-03-27
OSV
Use of Insufficiently Random Values in Railties Allows Remote Code Execution2019-03-13
GHSA
Use of Insufficiently Random Values in Railties Allows Remote Code Execution2019-03-13

💥Exploits & PoCs

1
Exploit-DB
Ruby On Rails - DoubleTap Development Mode secret_key_base Remote Code Execution (Metasploit)2019-05-02

📋Vendor Advisories

2
Red Hat
rubygem-rails: Weak secret token leading to possible code execution2019-03-13
Debian
CVE-2019-5420: rails - A remote code execution vulnerability in development mode Rails <5.2.2.1, <6.0.0...2019

💬Community

2
Bugzilla
CVE-2019-5420 rubygem-rails: Weak secret token leading to possible code execution2019-03-15
Bugzilla
CVE-2019-5420 rubygem-rails: Weak secret token leading to possible code execution [fedora-all]2019-03-15
CVE-2019-5420 — Command Injection in Rubyonrails Rails | cvebase