5
CVSSv2

CVE-2016-2097

Published: 07/04/2016 Updated: 08/08/2019
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

Directory traversal vulnerability in Action View in Ruby on Rails prior to 3.2.22.2 and 4.x prior to 4.1.14.2 allows remote malicious users to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0752.

Vulnerable Product Search on Vulmon Subscribe to Product

rubyonrails rails 4.0.4

rubyonrails rails 4.1.9

rubyonrails rails 4.1.4

rubyonrails rails 4.1.3

rubyonrails rails 4.1.12

rubyonrails rails 4.1.10

rubyonrails rails 4.1.0

rubyonrails rails 4.0.6

rubyonrails rails 4.0.5

rubyonrails rails 4.0.1

rubyonrails ruby on rails

rubyonrails rails 4.1.6

rubyonrails rails 4.1.5

rubyonrails rails 4.1.14

rubyonrails rails 4.1.13

rubyonrails rails 4.0.10

rubyonrails rails 4.0.0

rubyonrails rails 4.1.7

rubyonrails rails 4.1.2

rubyonrails rails 4.1.1

rubyonrails rails 4.0.8

rubyonrails rails 4.0.7

rubyonrails rails 4.0.3

rubyonrails rails 4.0.2

rubyonrails rails 4.1.8

rubyonrails rails 4.1.7.1

rubyonrails rails 4.0.9

rubyonrails ruby on rails 4.1.14.1

Vendor Advisories

Two vulnerabilities have been discovered in Rails, a web application framework written in Ruby Both vulnerabilities affect Action Pack, which handles the web requests for Rails CVE-2016-2097 Crafted requests to Action View, one of the components of Action Pack, might result in rendering files from arbitrary locations, including files ...