CVE-2024-32978

May 27, 2024, 4:15 p.m.

Received
CVE has been recently published to the CVE List and has been received by the NVD.

Products

Kaminari

  • 1.2.2+

Source

security-advisories@github.com

Tags

CVE-2024-32978 details

Published : May 27, 2024, 4:15 p.m.
Last Modified : May 27, 2024, 4:15 p.m.

Description

Kaminari is a paginator for web app frameworks and object relational mappings. A security vulnerability involving insecure file permissions has been identified in the Kaminari pagination library for Ruby on Rails, concerning insecure file permissions. This vulnerability is of moderate severity due to the potential for unauthorized write access to particular Ruby files managed by the library. Such access could lead to the alteration of application behavior or data integrity issues. Users of affected versions are advised to update to Kaminari version 1.2.2 or later, where file permissions have been adjusted to enhance security. If upgrading is not feasible immediately, review and adjust the file permissions for particular Ruby files in Kaminari to ensure they are only accessible by authorized user.

CVSS Score

1 2 3 4 5 6.6 7 8 9 10

Weakness

Weakness Name Description

CVSS Data

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

HIGH

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

Base Score

6.6

Exploitability Score

Impact Score

Base Severity

MEDIUM

References

URL Source
https://github.com/kaminari/kaminari/security/advisories/GHSA-7r3j-qmr4-jfpj security-advisories@github.com
This website uses the NVD API, but is not approved or certified by it.