CVE-2026-33173

Active Storage allows users to attach cloud and local files in Rails applications. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, `DirectUploadsController` accepts arbitrary metadata from the client and persists it on the blob. Because internal flags like `identified` and `analyzed` are stored in the same metadata hash, a direct-upload client can set these flags to skip MIME detection and analysis. This allows an attacker to upload arbitrary content while claiming a safe `content_type`, bypassing any validations that rely on Active Storage's automatic content type identification. Versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 contain a patch.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*

History

24 Mar 2026, 17:56

Type Values Removed Values Added
First Time Rubyonrails
Rubyonrails rails
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.3
Summary
  • (es) Active Storage permite a los usuarios adjuntar archivos locales y en la nube en aplicaciones Rails. Antes de las versiones 8.1.2.1, 8.0.4.1 y 7.2.3.1, 'DirectUploadsController' acepta metadatos arbitrarios del cliente y los persiste en el blob. Debido a que indicadores internos como 'identified' y 'analyzed' se almacenan en el mismo hash de metadatos, un cliente de carga directa puede establecer estos indicadores para omitir la detección y el análisis MIME. Esto permite a un atacante cargar contenido arbitrario mientras declara un 'content_type' seguro, eludiendo cualquier validación que dependa de la identificación automática del tipo de contenido de Active Storage. Las versiones 8.1.2.1, 8.0.4.1 y 7.2.3.1 contienen un parche.
CPE cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
References () https://github.com/rails/rails/commit/707c0f1f41f067fdf96d54e99d43b28dfaae7e53 - () https://github.com/rails/rails/commit/707c0f1f41f067fdf96d54e99d43b28dfaae7e53 - Patch
References () https://github.com/rails/rails/commit/8fcb934caadc79c8cc4ce53287046d0f67005b3e - () https://github.com/rails/rails/commit/8fcb934caadc79c8cc4ce53287046d0f67005b3e - Patch
References () https://github.com/rails/rails/commit/d9502f5214e2198245a4c1defe9cd02a7c8057d0 - () https://github.com/rails/rails/commit/d9502f5214e2198245a4c1defe9cd02a7c8057d0 - Patch
References () https://github.com/rails/rails/releases/tag/v7.2.3.1 - () https://github.com/rails/rails/releases/tag/v7.2.3.1 - Release Notes
References () https://github.com/rails/rails/releases/tag/v8.0.4.1 - () https://github.com/rails/rails/releases/tag/v8.0.4.1 - Release Notes
References () https://github.com/rails/rails/releases/tag/v8.1.2.1 - () https://github.com/rails/rails/releases/tag/v8.1.2.1 - Release Notes
References () https://github.com/rails/rails/security/advisories/GHSA-qcfx-2mfw-w4cg - () https://github.com/rails/rails/security/advisories/GHSA-qcfx-2mfw-w4cg - Vendor Advisory

24 Mar 2026, 00:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-24 00:16

Updated : 2026-03-24 17:56


NVD link : CVE-2026-33173

Mitre link : CVE-2026-33173

CVE.ORG link : CVE-2026-33173


JSON object : View

Products Affected

rubyonrails

  • rails
CWE
CWE-925

Improper Verification of Intent by Broadcast Receiver