CVE DATABASE / CVE-2014-0130
CVE-2014-0130
Ruby on Rails Directory Traversal Vulnerability
Confirmed exploited in the wild. Added 2022-03-25.
Federal remediation due 2022-04-15.
Required action: Apply updates per vendor instructions.
Summary
Directory traversal vulnerability in actionpack/lib/abstract_controller/base.rb in the implicit-render implementation in Ruby on Rails before 3.2.18, 4.0.x before 4.0.5, and 4.1.x before 4.1.1, when certain route globbing configurations are enabled, allows remote attackers to read arbitrary files via a crafted request.
CVSS 3.1 breakdown
| Base score | 7.5 (HIGH) |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
| Attack vector | NETWORK |
| Attack complexity | LOW |
| Privileges required | NONE |
| User interaction | NONE |
| Scope | UNCHANGED |
| Confidentiality | HIGH |
| Integrity | NONE |
| Availability | NONE |
Weakness type (CWE)
Affected products
Use our free CVE Lookup tool for the latest NVD record, or browse the full CISA KEV catalog.
References
- http://matasano.com/research/AnatomyOfRailsVuln-CVE-2014-0130.pdf
- http://rhn.redhat.com/errata/RHSA-2014-1863.html
- http://www.securityfocus.com/bid/67244
- https://groups.google.com/forum/message/raw?msg=rubyonrails-security/NkKc7vTW70o/NxW_PDBSG3AJ
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2014-0130
Data: NIST NVD + CISA KEV. NVD last modified 2026-04-21. Always verify against the vendor advisory before acting.