Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2016-02-16 02:59
Updated : 2024-07-16 17:56
NVD link : CVE-2016-0752
Mitre link : CVE-2016-0752
CVE.ORG link : CVE-2016-0752
JSON object : View
Products Affected
rubyonrails
- rails
redhat
- software_collections
opensuse
- leap
- opensuse
debian
- debian_linux
suse
- linux_enterprise_module_for_containers
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')