CVE-2019-5420
CRITICALRuby On Rails DoubleTap Development Mode secret_key_base Vulnerability
Title source: metasploitDescription
A remote code execution vulnerability in development mode Rails <5.2.2.1, <6.0.0.beta3 can allow an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.
Exploits (14)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotelinux
https://www.exploit-db.com/exploits/46785
nomisec
WORKING POC
1 stars
by WildWestCyberSecurity · poc
https://github.com/WildWestCyberSecurity/cve-2019-5420-POC
metasploit
WORKING POC
EXCELLENT
by ooooooo_q, mpgn, sinn3r · rubypoclinux
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/rails_double_tap.rb
References (5)
Scores
CVSS v3
9.8
EPSS
0.9375
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-330
CWE-77
Status
published
Products (5)
debian/debian_linux
8.0
fedoraproject/fedora
30
rubygems/railties
5.2.0 - 5.2.2.1RubyGems
rubyonrails/rails
6.0.0 beta1 (2 CPE variants)
rubyonrails/rails
< 5.2.2.1
Published
Mar 27, 2019
Tracked Since
Feb 18, 2026