Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-0752

Опубликовано: 25 янв. 2016
Источник: redhat
CVSS2: 6.8
EPSS Критический

Описание

Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname.

A directory traversal flaw was found in the way the Action View component searched for templates for rendering. If an application passed untrusted input to the 'render' method, a remote, unauthenticated attacker could use this flaw to render unexpected files and, possibly, execute arbitrary code.

Меры по смягчению последствий

Avoid passing untrusted input to render method, or verify the input using whitelist before passing it to the render method:

def index render verify_template(params[:id]) end private def verify_template(name) # add verification logic particular to your application here end

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
CloudForms Management Engine 5.2ruby193-rubygem-actionpackWill not fix
CloudForms Management Engine 5.3ruby193-rubygem-actionpackWill not fix
Red Hat Subscription Asset Managerruby193-rubygem-actionpackWill not fix
Red Hat Subscription Asset Managerrubygem-actionpackWill not fix
Red Hat Software Collections for Red Hat Enterprise Linux 6rh-ror41-rubygem-actionpackFixedRHSA-2016:029624.02.2016
Red Hat Software Collections for Red Hat Enterprise Linux 6rh-ror41-rubygem-actionviewFixedRHSA-2016:029624.02.2016
Red Hat Software Collections for Red Hat Enterprise Linux 6rh-ror41-rubygem-activemodelFixedRHSA-2016:029624.02.2016
Red Hat Software Collections for Red Hat Enterprise Linux 6rh-ror41-rubygem-activerecordFixedRHSA-2016:029624.02.2016
Red Hat Software Collections for Red Hat Enterprise Linux 6rh-ror41-rubygem-activesupportFixedRHSA-2016:029624.02.2016
Red Hat Software Collections for Red Hat Enterprise Linux 6ror40-rubygem-actionpackFixedRHSA-2016:045415.03.2016

Показывать по

Дополнительная информация

Статус:

Important
Дефект:
CWE-22
https://bugzilla.redhat.com/show_bug.cgi?id=1301963rubygem-actionpack: directory traversal flaw in Action View

EPSS

Процентиль: 100%
0.92705
Критический

6.8 Medium

CVSS2

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 10 лет назад

Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname.

CVSS3: 7.5
nvd
почти 10 лет назад

Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname.

CVSS3: 7.5
debian
почти 10 лет назад

Directory traversal vulnerability in Action View in Ruby on Rails befo ...

CVSS3: 7.5
github
больше 8 лет назад

Directory traversal vulnerability in Action View in Ruby on Rails

fstec
почти 10 лет назад

Уязвимость программной платформы Ruby on Rails, позволяющая нарушителю читать произвольные файлы

EPSS

Процентиль: 100%
0.92705
Критический

6.8 Medium

CVSS2