-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.1780
                     Rails -- multiple vulnerabilities
                                20 May 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           rails
Publisher:         FreeBSD
Operating System:  FreeBSD
                   UNIX variants (UNIX, Linux, OSX)
Impact/Access:     Execute Arbitrary Code/Commands -- Unknown/Unspecified
                   Modify Arbitrary Files          -- Unknown/Unspecified
                   Cross-site Request Forgery      -- Unknown/Unspecified
                   Unauthorised Access             -- Unknown/Unspecified
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-8167 CVE-2020-8166 CVE-2020-8165
                   CVE-2020-8164 CVE-2020-8162 

Original Bulletin: 
   http://www.vuxml.org/freebsd/85fca718-99f6-11ea-bf1d-08002728f74c.html

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than FreeBSD. It is recommended that administrators
         running rails check for an updated version of the software for their
         operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports
Collection

Rails -- multiple vulnerabilities

Affected packages
  rubygem-actionpack52    < 5.2.4.3
  rubygem-actionview52    < 5.2.4.3
  rubygem-activestorage52 < 5.2.4.3
  rubygem-activesupport52 < 5.2.4.3
  rubygem-actionpack60    < 6.0.3.1
  rubygem-actionview60    < 6.0.3.1
  rubygem-activestorage60 < 6.0.3.1
  rubygem-activesupport60 < 6.0.3.1

Details

VuXML ID  85fca718-99f6-11ea-bf1d-08002728f74c
Discovery 2020-05-18
Entry     2020-05-19

Ruby on Rails blog:

    Hi everyone! Rails 5.2.4.3 and 6.0.3.1 have been released! These releases
    contain important security fixes, so please upgrade when you can.

    Both releases contain the following fixes:

    CVE-2020-8162: Circumvention of file size limits in ActiveStorage

    CVE-2020-8164: Possible Strong Parameters Bypass in ActionPack

    CVE-2020-8165: Potentially unintended unmarshalling of user-provided
    objects in MemCacheStore and RedisCacheStore

    CVE-2020-8166: Ability to forge per-form CSRF tokens given a global CSRF
    token

    CVE-2020-8167: CSRF Vulnerability in rails-ujs

    [source]

References

CVE     CVE-2020-8162
Name
CVE     CVE-2020-8164
Name
CVE     CVE-2020-8165
Name
CVE     CVE-2020-8166
Name
CVE     CVE-2020-8167
Name
URL     https://groups.google.com/forum/#!topic/rubyonrails-security/
        bv6fW4S0Y1c
URL     https://groups.google.com/forum/#!topic/rubyonrails-security/
        f6ioe4sdpbY
URL     https://groups.google.com/forum/#!topic/rubyonrails-security/
        NOjKiGeXUgw
URL     https://groups.google.com/forum/#!topic/rubyonrails-security/
        PjU3946mreQ
URL     https://groups.google.com/forum/#!topic/rubyonrails-security/
        x9DixQDG9a0
URL     https://weblog.rubyonrails.org/2020/5/18/
        Rails-5-2-4-3-and-6-0-3-1-have-been-released/

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=3EsU
-----END PGP SIGNATURE-----