message_bus 1.0.7

1 security vulnerability found in version 1.0.7

Path traversal when MessageBus::Diagnostics is enabled

medium severity CVE-2021-43840
medium severity CVE-2021-43840
Patched versions: >= 3.3.7

Impact

Users who deployed message bus with diagnostics features enabled (default off) were vulnerable to a path traversal bug, which could lead to disclosure of secret information on a machine if an unintended user were to gain access to the diagnostic route. The impact is also greater if there is no proxy for your web application as the number of steps up the directories is not bounded. For deployments which uses a proxy, the impact varies. For example, If a request goes through a proxy like Nginx with merge_slashes enabled, the number of steps up the directories that can be read is limited to 3 levels.

Workarounds

Disable MessageBus::Diagnostics in production like environments.

No officially reported memory leakage issues detected.


This gem version does not have any officially reported memory leaked issues.

No license issues detected.


This gem version has a license in the gemspec.

This gem version is available.


This gem version has not been yanked and is still available for usage.