Project Subscriptions
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-9xrj-h377-fr87 | Rails Active Storage has possible Path Traversal in DiskService |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 24 Mar 2026 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rubyonrails
Rubyonrails rails |
|
| CPEs | cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Rubyonrails
Rubyonrails rails |
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Tue, 24 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 24 Mar 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Tue, 24 Mar 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rails
Rails activestorage |
|
| Vendors & Products |
Rails
Rails activestorage |
Tue, 24 Mar 2026 02:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Active Storage allows users to attach cloud and local files in Rails applications. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, Active Storage's `DiskService#path_for` does not validate that the resolved filesystem path remains within the storage root directory. If a blob key containing path traversal sequences (e.g. `../`) is used, it could allow reading, writing, or deleting arbitrary files on the server. Blob keys are expected to be trusted strings, but some applications could be passing user input as keys and would be affected. Versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 contain a patch. | |
| Title | Rails Active Storage has possible Path Traversal in DiskService | |
| Weaknesses | CWE-22 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-24T14:11:19.263Z
Reserved: 2026-03-17T22:16:36.721Z
Link: CVE-2026-33195
Updated: 2026-03-24T14:11:13.687Z
Status : Analyzed
Published: 2026-03-24T00:16:28.987
Modified: 2026-03-24T17:55:45.480
Link: CVE-2026-33195
OpenCVE Enrichment
Updated: 2026-03-24T10:29:52Z
Github GHSA