Directory traversal in Ruby on Rails

Published: 2016-02-17 18:07:16
Severity Medium
Patch available YES
Number of vulnerabilities 1
CVE ID CVE-2016-0752
CVSSv3 5.4 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N/E:F/RL:O/RC:C]
CWE ID CWE-22
Exploitation vector Network
Public exploit Public exploit code for vulnerability #1 is available.
Vulnerable software Ruby on Rails
Vulnerable software versions Ruby on Rails 3.2.0
Ruby on Rails 3.2.0.rc1
Ruby on Rails 3.2.0.rc2
Show more
Vendor URL Rails

Security Advisory

1) Path traversal

Description

The vulnerability allows a remote attacker to read arbitrary files on the system.

The vulnerability exists due to improper input validation in Action View. A remote attacker can send a specially crafted request, containing directory traversal sequences (e.g. "../") and view contents of arbitrary file on vulnerable system.

Remediation

Update to version 3.2.22.1, 4.1.14.1 or 4.2.5.1.

External links

https://groups.google.com/forum/message/raw?msg=ruby-security-ann/335P1DcLG00/JXcBnTtZEgAJ

Back to List