Directory traversal in Ruby on Rails

Published: 2016-02-17 18:07:16
Severity Medium
Patch available YES
Number of vulnerabilities 1
CVSSv2 3.7 (AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
CVSSv3 4.9 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE ID CVE-2016-0752
CWE ID CWE-22
Exploitation vector Network
Public exploit Not available
Vulnerable software Ruby on Rails
Vulnerable software versions Ruby on Rails 3.2.0
Ruby on Rails 3.2.0.rc1
Ruby on Rails 3.2.0.rc2
Show more
Vendor URL Rails
Advisory type Public

Security Advisory

1) Path traversal

Description

The vulnerability allows a remote attacker to read arbitrary files on the system.

The vulnerability exists due to improper input validation in Action View. A remote attacker can send a specially crafted request, containing directory traversal sequences (e.g. "../") and view contents of arbitrary file on vulnerable system.

Remediation

Update to version 3.2.22.1, 4.1.14.1 or 4.2.5.1.

External links

https://groups.google.com/forum/message/raw?msg=ruby-security-ann/335P1DcLG00/JXcBnTtZEgAJ

Back to List