CVE-2016-0752

Related Vulnerabilities: CVE-2016-0752  

A directory traversal flaw was found in the way the Action View component searched for templates for rendering. If an application passed untrusted input to the 'render' method, a remote, unauthenticated attacker could use this flaw to render unexpected files and, possibly, execute arbitrary code.

A directory traversal flaw was found in the way the Action View component searched for templates for rendering. If an application passed untrusted input to the 'render' method, a remote, unauthenticated attacker could use this flaw to render unexpected files and, possibly, execute arbitrary code.

Find out more about CVE-2016-0752 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 6.8
Base Metrics AV:N/AC:M/Au:N/C:P/I:P/A:P
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact Partial
Availability Impact Partial

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Software Collections for Red Hat Enterprise Linux 7 RHSA-2016:0296 2016-02-24
Red Hat Software Collections for Red Hat Enterprise Linux 7 (ruby193-rubygem-actionpack) RHSA-2016:0455 2016-03-15
Red Hat Software Collections for Red Hat Enterprise Linux 7 (ror40-rubygem-actionpack) RHSA-2016:0454 2016-03-15
Red Hat Software Collections for Red Hat Enterprise Linux 6 RHSA-2016:0296 2016-02-24
Red Hat Software Collections for Red Hat Enterprise Linux 6 (ror40-rubygem-actionpack) RHSA-2016:0454 2016-03-15
Red Hat Software Collections for Red Hat Enterprise Linux 6 (ruby193-rubygem-actionpack) RHSA-2016:0455 2016-03-15

Affected Packages State

Platform Package State
Red Hat Subscription Asset Manager 1 ruby193-rubygem-actionpack Will not fix
Red Hat Subscription Asset Manager 1 rubygem-actionpack Will not fix

Acknowledgements

Red Hat would like to thank Ruby on Rails project for reporting this issue. Upstream acknowledges John Poulin as the original reporter.

Mitigation

Avoid passing untrusted input to render method, or verify the input using whitelist before passing it to the render method:


def index
render verify_template(params[:id])
end

private
def verify_template(name)
# add verification logic particular to your application here
end

External References