![]() |
|
HackerOne Disclosed Reports - 2026-05-07 - Printable Version +- Dark C0d3rs (https://darkcoders.wiki) +-- Forum: Exploit Log (https://darkcoders.wiki/Forum-Exploit-Log) +--- Forum: Research Papers/Vulnerability reports (https://darkcoders.wiki/Forum-Research-Papers-Vulnerability-reports) +--- Thread: HackerOne Disclosed Reports - 2026-05-07 (/Thread-HackerOne-Disclosed-Reports-2026-05-07) |
HackerOne disclosed reports - 2026-05-07 - hashXploiter - 05-08-2026
Medium
resolved ActiveStorage Disk Service Path Traversal via Custom Blob Key InjectionBug reported by kim siwong was disclosed at May 7, 2026, 2:04 pm | Path Traversal A vulnerability was discovered in the ActiveStorage Disk Service component of Ruby on Rails. The vulnerability allowed an attacker to achieve arbitrary file write, read, and delete on the server's filesystem by injecting a malicious blob key. The vulnerability was due to insufficient validation of the blob key parameter before constructing file paths. This could be exploited by an attacker who could influence the hash passed to the `.attach()` method. |