-
Notifications
You must be signed in to change notification settings - Fork 924
Description
CVE-2026-33202 - High Severity Vulnerability
Vulnerable Library - activestorage-8.0.4.gem
Attach cloud and local files in Rails applications.
Library home page: https://rubygems.org/gems/activestorage-8.0.4.gem
Path to dependency file: /Gemfile.lock
Path to vulnerable library: /tmp/containerbase/cache/.ruby/cache/activestorage-8.0.4.gem
Dependency Hierarchy:
- gettext_i18n_rails_js-1.3.1.gem (Root Library)
- rails-8.0.4.gem
- ❌ activestorage-8.0.4.gem (Vulnerable Library)
- rails-8.0.4.gem
Found in base branch: master
Vulnerability Details
Active Storage allows users to attach cloud and local files in Rails applications. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, Active Storage's "DiskService#delete_prefixed" passes blob keys directly to "Dir.glob" without escaping glob metacharacters. If a blob key contains attacker-controlled input or custom-generated keys with glob metacharacters, it may be possible to delete unintended files from the storage directory. Versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 contain a patch.
Publish Date: 2026-03-23
URL: CVE-2026-33202
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: None
- Integrity Impact: High
- Availability Impact: None
Suggested Fix
Type: Upgrade version
Release Date: 2026-03-23
Fix Resolution: https://github.com/rails/rails.git - v8.0.4.1,https://github.com/rails/rails.git - v8.1.3,https://github.com/rails/rails.git - v7.2.3.1,https://github.com/rails/rails.git - v8.1.2.1,https://github.com/rails/rails.git - v8.0.5
Step up your Open Source Security Game with Mend here