UBUNTU-CVE-2026-33202

Source
https://ubuntu.com/security/CVE-2026-33202
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-33202.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2026-33202
Upstream
Published
2026-03-24T00:16:00Z
Modified
2026-03-27T17:19:36.807463Z
Severity
  • 6.6 (Medium) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N/E:U CVSS Calculator
  • 9.1 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

Active Storage allows users to attach cloud and local files in Rails applications. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, Active Storage's DiskService#delete_prefixed passes blob keys directly to Dir.glob without escaping glob metacharacters. If a blob key contains attacker-controlled input or custom-generated keys with glob metacharacters, it may be possible to delete unintended files from the storage directory. Versions 8.1.2.1, 8.0.4.1, and 7.2.3.1 contain a patch.

References

Affected packages

Ubuntu:24.04:LTS
rails

Package

Name
rails
Purl
pkg:deb/ubuntu/rails@2:6.1.7.3+dfsg-3?arch=source&distro=noble

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:6.*
2:6.1.7.3+dfsg-2build1
2:6.1.7.3+dfsg-3

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2:6.1.7.3+dfsg-3",
            "binary_name": "rails"
        },
        {
            "binary_version": "2:6.1.7.3+dfsg-3",
            "binary_name": "ruby-actioncable"
        },
        {
            "binary_version": "2:6.1.7.3+dfsg-3",
            "binary_name": "ruby-actionmailbox"
        },
        {
            "binary_version": "2:6.1.7.3+dfsg-3",
            "binary_name": "ruby-actionmailer"
        },
        {
            "binary_version": "2:6.1.7.3+dfsg-3",
            "binary_name": "ruby-actionpack"
        },
        {
            "binary_version": "2:6.1.7.3+dfsg-3",
            "binary_name": "ruby-actiontext"
        },
        {
            "binary_version": "2:6.1.7.3+dfsg-3",
            "binary_name": "ruby-actionview"
        },
        {
            "binary_version": "2:6.1.7.3+dfsg-3",
            "binary_name": "ruby-activejob"
        },
        {
            "binary_version": "2:6.1.7.3+dfsg-3",
            "binary_name": "ruby-activemodel"
        },
        {
            "binary_version": "2:6.1.7.3+dfsg-3",
            "binary_name": "ruby-activerecord"
        },
        {
            "binary_version": "2:6.1.7.3+dfsg-3",
            "binary_name": "ruby-activestorage"
        },
        {
            "binary_version": "2:6.1.7.3+dfsg-3",
            "binary_name": "ruby-activesupport"
        },
        {
            "binary_version": "2:6.1.7.3+dfsg-3",
            "binary_name": "ruby-rails"
        },
        {
            "binary_version": "2:6.1.7.3+dfsg-3",
            "binary_name": "ruby-railties"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-33202.json"
Ubuntu:25.10
rails

Package

Name
rails
Purl
pkg:deb/ubuntu/rails@2:7.2.2.1+dfsg-7?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:6.*
2:6.1.7.3+dfsg-7
2:7.*
2:7.2.2.1+dfsg-7

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2:7.2.2.1+dfsg-7",
            "binary_name": "rails"
        },
        {
            "binary_version": "2:7.2.2.1+dfsg-7",
            "binary_name": "ruby-actioncable"
        },
        {
            "binary_version": "2:7.2.2.1+dfsg-7",
            "binary_name": "ruby-actionmailbox"
        },
        {
            "binary_version": "2:7.2.2.1+dfsg-7",
            "binary_name": "ruby-actionmailer"
        },
        {
            "binary_version": "2:7.2.2.1+dfsg-7",
            "binary_name": "ruby-actionpack"
        },
        {
            "binary_version": "2:7.2.2.1+dfsg-7",
            "binary_name": "ruby-actiontext"
        },
        {
            "binary_version": "2:7.2.2.1+dfsg-7",
            "binary_name": "ruby-actionview"
        },
        {
            "binary_version": "2:7.2.2.1+dfsg-7",
            "binary_name": "ruby-activejob"
        },
        {
            "binary_version": "2:7.2.2.1+dfsg-7",
            "binary_name": "ruby-activemodel"
        },
        {
            "binary_version": "2:7.2.2.1+dfsg-7",
            "binary_name": "ruby-activerecord"
        },
        {
            "binary_version": "2:7.2.2.1+dfsg-7",
            "binary_name": "ruby-activestorage"
        },
        {
            "binary_version": "2:7.2.2.1+dfsg-7",
            "binary_name": "ruby-activesupport"
        },
        {
            "binary_version": "2:7.2.2.1+dfsg-7",
            "binary_name": "ruby-rails"
        },
        {
            "binary_version": "2:7.2.2.1+dfsg-7",
            "binary_name": "ruby-railties"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-33202.json"
Ubuntu:Pro:16.04:LTS
rails

Package

Name
rails
Purl
pkg:deb/ubuntu/rails@2:4.2.6-1ubuntu0.1~esm2?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:4.*
2:4.1.10-1
2:4.2.5-1
2:4.2.5.1-1
2:4.2.5.2-2
2:4.2.6-1
2:4.2.6-1ubuntu0.1~esm1
2:4.2.6-1ubuntu0.1~esm2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2:4.2.6-1ubuntu0.1~esm2",
            "binary_name": "rails"
        },
        {
            "binary_version": "2:4.2.6-1ubuntu0.1~esm2",
            "binary_name": "ruby-actionmailer"
        },
        {
            "binary_version": "2:4.2.6-1ubuntu0.1~esm2",
            "binary_name": "ruby-actionpack"
        },
        {
            "binary_version": "2:4.2.6-1ubuntu0.1~esm2",
            "binary_name": "ruby-actionview"
        },
        {
            "binary_version": "2:4.2.6-1ubuntu0.1~esm2",
            "binary_name": "ruby-activejob"
        },
        {
            "binary_version": "2:4.2.6-1ubuntu0.1~esm2",
            "binary_name": "ruby-activemodel"
        },
        {
            "binary_version": "2:4.2.6-1ubuntu0.1~esm2",
            "binary_name": "ruby-activerecord"
        },
        {
            "binary_version": "2:4.2.6-1ubuntu0.1~esm2",
            "binary_name": "ruby-activesupport"
        },
        {
            "binary_version": "2:4.2.6-1ubuntu0.1~esm2",
            "binary_name": "ruby-rails"
        },
        {
            "binary_version": "2:4.2.6-1ubuntu0.1~esm2",
            "binary_name": "ruby-railties"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-33202.json"
Ubuntu:Pro:18.04:LTS
rails

Package

Name
rails
Purl
pkg:deb/ubuntu/rails@2:4.2.10-0ubuntu4+esm2?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:4.*
2:4.2.9-2
2:4.2.9-4
2:4.2.10-0ubuntu4
2:4.2.10-0ubuntu4+esm1
2:4.2.10-0ubuntu4+esm2

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2:4.2.10-0ubuntu4+esm2",
            "binary_name": "rails"
        },
        {
            "binary_version": "2:4.2.10-0ubuntu4+esm2",
            "binary_name": "ruby-actionmailer"
        },
        {
            "binary_version": "2:4.2.10-0ubuntu4+esm2",
            "binary_name": "ruby-actionpack"
        },
        {
            "binary_version": "2:4.2.10-0ubuntu4+esm2",
            "binary_name": "ruby-actionview"
        },
        {
            "binary_version": "2:4.2.10-0ubuntu4+esm2",
            "binary_name": "ruby-activejob"
        },
        {
            "binary_version": "2:4.2.10-0ubuntu4+esm2",
            "binary_name": "ruby-activemodel"
        },
        {
            "binary_version": "2:4.2.10-0ubuntu4+esm2",
            "binary_name": "ruby-activerecord"
        },
        {
            "binary_version": "2:4.2.10-0ubuntu4+esm2",
            "binary_name": "ruby-activesupport"
        },
        {
            "binary_version": "2:4.2.10-0ubuntu4+esm2",
            "binary_name": "ruby-rails"
        },
        {
            "binary_version": "2:4.2.10-0ubuntu4+esm2",
            "binary_name": "ruby-railties"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-33202.json"
Ubuntu:Pro:20.04:LTS
rails

Package

Name
rails
Purl
pkg:deb/ubuntu/rails@2:5.2.3+dfsg-3ubuntu0.1~esm1?arch=source&distro=esm-apps/focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:5.*
2:5.2.2.1+dfsg-1ubuntu1
2:5.2.3+dfsg-3
2:5.2.3+dfsg-3ubuntu0.1~esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2:5.2.3+dfsg-3ubuntu0.1~esm1",
            "binary_name": "rails"
        },
        {
            "binary_version": "2:5.2.3+dfsg-3ubuntu0.1~esm1",
            "binary_name": "ruby-actioncable"
        },
        {
            "binary_version": "2:5.2.3+dfsg-3ubuntu0.1~esm1",
            "binary_name": "ruby-actionmailer"
        },
        {
            "binary_version": "2:5.2.3+dfsg-3ubuntu0.1~esm1",
            "binary_name": "ruby-actionpack"
        },
        {
            "binary_version": "2:5.2.3+dfsg-3ubuntu0.1~esm1",
            "binary_name": "ruby-actionview"
        },
        {
            "binary_version": "2:5.2.3+dfsg-3ubuntu0.1~esm1",
            "binary_name": "ruby-activejob"
        },
        {
            "binary_version": "2:5.2.3+dfsg-3ubuntu0.1~esm1",
            "binary_name": "ruby-activemodel"
        },
        {
            "binary_version": "2:5.2.3+dfsg-3ubuntu0.1~esm1",
            "binary_name": "ruby-activerecord"
        },
        {
            "binary_version": "2:5.2.3+dfsg-3ubuntu0.1~esm1",
            "binary_name": "ruby-activestorage"
        },
        {
            "binary_version": "2:5.2.3+dfsg-3ubuntu0.1~esm1",
            "binary_name": "ruby-activesupport"
        },
        {
            "binary_version": "2:5.2.3+dfsg-3ubuntu0.1~esm1",
            "binary_name": "ruby-rails"
        },
        {
            "binary_version": "2:5.2.3+dfsg-3ubuntu0.1~esm1",
            "binary_name": "ruby-railties"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-33202.json"
Ubuntu:Pro:22.04:LTS
rails

Package

Name
rails
Purl
pkg:deb/ubuntu/rails@2:6.1.4.1+dfsg-8ubuntu2+esm1?arch=source&distro=esm-apps/jammy

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2:6.*
2:6.0.3.7+dfsg-2
2:6.1.4.1+dfsg-8ubuntu2
2:6.1.4.1+dfsg-8ubuntu2+esm1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "2:6.1.4.1+dfsg-8ubuntu2+esm1",
            "binary_name": "rails"
        },
        {
            "binary_version": "2:6.1.4.1+dfsg-8ubuntu2+esm1",
            "binary_name": "ruby-actioncable"
        },
        {
            "binary_version": "2:6.1.4.1+dfsg-8ubuntu2+esm1",
            "binary_name": "ruby-actionmailbox"
        },
        {
            "binary_version": "2:6.1.4.1+dfsg-8ubuntu2+esm1",
            "binary_name": "ruby-actionmailer"
        },
        {
            "binary_version": "2:6.1.4.1+dfsg-8ubuntu2+esm1",
            "binary_name": "ruby-actionpack"
        },
        {
            "binary_version": "2:6.1.4.1+dfsg-8ubuntu2+esm1",
            "binary_name": "ruby-actiontext"
        },
        {
            "binary_version": "2:6.1.4.1+dfsg-8ubuntu2+esm1",
            "binary_name": "ruby-actionview"
        },
        {
            "binary_version": "2:6.1.4.1+dfsg-8ubuntu2+esm1",
            "binary_name": "ruby-activejob"
        },
        {
            "binary_version": "2:6.1.4.1+dfsg-8ubuntu2+esm1",
            "binary_name": "ruby-activemodel"
        },
        {
            "binary_version": "2:6.1.4.1+dfsg-8ubuntu2+esm1",
            "binary_name": "ruby-activerecord"
        },
        {
            "binary_version": "2:6.1.4.1+dfsg-8ubuntu2+esm1",
            "binary_name": "ruby-activestorage"
        },
        {
            "binary_version": "2:6.1.4.1+dfsg-8ubuntu2+esm1",
            "binary_name": "ruby-activesupport"
        },
        {
            "binary_version": "2:6.1.4.1+dfsg-8ubuntu2+esm1",
            "binary_name": "ruby-rails"
        },
        {
            "binary_version": "2:6.1.4.1+dfsg-8ubuntu2+esm1",
            "binary_name": "ruby-railties"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2026/UBUNTU-CVE-2026-33202.json"