尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
| 厂商 | 产品 | 影响版本 | CPE | 订阅 |
|---|---|---|---|---|
| Rails | https://github.com/rails/rails | 5.2.2.1 | - |
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | CVE-2019-5418 - File Content Disclosure on Ruby on Rails | https://github.com/mpgn/CVE-2019-5418 | POC详情 |
| 2 | File Content Disclosure on Rails Test Case - CVE-2019-5418 | https://github.com/omarkurt/CVE-2019-5418 | POC详情 |
| 3 | A multi-threaded Golang scanner to identify Ruby endpoints vulnerable to CVE-2019-5418 | https://github.com/brompwnie/CVE-2019-5418-Scanner | POC详情 |
| 4 | RCE on Rails 5.2.2 using a path traversal (CVE-2019-5418) and a deserialization of Ruby objects (CVE-2019-5420) | https://github.com/mpgn/Rails-doubletap-RCE | POC详情 |
| 5 | None | https://github.com/takeokunn/CVE-2019-5418 | POC详情 |
| 6 | a demo for Ruby on Rails CVE-2019-5418 | https://github.com/Bad3r/RailroadBandit | POC详情 |
| 7 | Rails 3 PoC of CVE-2019-5418 | https://github.com/ztgrace/CVE-2019-5418-Rails3 | POC详情 |
| 8 | None | https://github.com/random-robbie/CVE-2019-5418 | POC详情 |
| 9 | Ruby on Rails是一个 Web 应用程序框架,是一个相对较新的 Web 应用程序框架,构建在 Ruby 语言之上。这个漏洞主要是由于Ruby on Rails使用了指定参数的render file来渲染应用之外的视图,我们可以通过修改访问某控制器的请求包,通过“…/…/…/…/”来达到路径穿越的目的,然后再通过“{{”来进行模板查询路径的闭合,使得所要访问的文件被当做外部模板来解析。 | https://github.com/kailing0220/CVE-2019-5418 | POC详情 |
| 10 | WHS 3기 장대혁 취약한(CVE) Docker 환경 구성 과제입니다. | https://github.com/daehyeok0618/CVE-2019-5418 | POC详情 |
| 11 | Rails <5.2.2.1, <5.1.6.2, <5.0.7.2, <4.2.11.1 and v3 are susceptible to a file content disclosure vulnerability because specially crafted accept headers can cause contents of arbitrary files on the target system's file system to be exposed. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2019/CVE-2019-5418.yaml | POC详情 |
| 12 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Ruby%20On%20Rails%20%E8%B7%AF%E5%BE%84%E7%A9%BF%E8%B6%8A%E4%B8%8E%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E%20CVE-2019-5418.md | POC详情 |
| 13 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E5%BC%80%E5%8F%91%E6%A1%86%E6%9E%B6%E6%BC%8F%E6%B4%9E/Rails%20Accept%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E6%BC%8F%E6%B4%9E%20CVE-2019-5418.md | POC详情 |
| 14 | https://github.com/vulhub/vulhub/blob/master/rails/CVE-2019-5418/README.md | POC详情 | |
| 15 | None | https://github.com/melardev/CVE-2019-5418 | POC详情 |
未找到公开 POC。
登录以生成 AI POC暂无评论