CVE-2016-0752

Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname.
References
Link Resource
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178044.html Permissions Required
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178069.html Permissions Required
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-0296.html Third Party Advisory
http://www.debian.org/security/2016/dsa-3464 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/01/25/13 Exploit Mailing List
http://www.securityfocus.com/bid/81801 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1034816 Broken Link Third Party Advisory VDB Entry
https://groups.google.com/forum/message/raw?msg=ruby-security-ann/335P1DcLG00/JXcBnTtZEgAJ Broken Link
https://www.exploit-db.com/exploits/40561/ Exploit Third Party Advisory VDB Entry
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178044.html Permissions Required
http://lists.fedoraproject.org/pipermail/package-announce/2016-February/178069.html Permissions Required
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2016-02/msg00034.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2016-02/msg00043.html Mailing List Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-0296.html Third Party Advisory
http://www.debian.org/security/2016/dsa-3464 Mailing List Third Party Advisory
http://www.openwall.com/lists/oss-security/2016/01/25/13 Exploit Mailing List
http://www.securityfocus.com/bid/81801 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1034816 Broken Link Third Party Advisory VDB Entry
https://groups.google.com/forum/message/raw?msg=ruby-security-ann/335P1DcLG00/JXcBnTtZEgAJ Broken Link
https://www.exploit-db.com/exploits/40561/ Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:*:*:*:*:*:*:*:*
cpe:2.3:a:rubyonrails:rails:5.0.0:beta1:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:opensuse:leap:42.1:*:*:*:*:*:*:*
cpe:2.3:o:opensuse:opensuse:13.2:*:*:*:*:*:*:*
cpe:2.3:o:suse:linux_enterprise_module_for_containers:12:*:*:*:*:*:*:*

Configuration 3 (hide)

cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:a:redhat:software_collections:1.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2016-02-16 02:59

Updated : 2025-04-12 10:46


NVD link : CVE-2016-0752

Mitre link : CVE-2016-0752

CVE.ORG link : CVE-2016-0752


JSON object : View

Products Affected

opensuse

  • opensuse
  • leap

debian

  • debian_linux

redhat

  • software_collections

rubyonrails

  • rails

suse

  • linux_enterprise_module_for_containers
CWE
CWE-22

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')