Directory traversal vulnerability in Action View in Ruby on Rails prior to 3.2.22.2 and 4.x prior to 4.1.14.2 allows remote malicious users to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0752.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
rubyonrails rails 4.0.4 |
||
rubyonrails rails 4.1.9 |
||
rubyonrails rails 4.1.4 |
||
rubyonrails rails 4.1.3 |
||
rubyonrails rails 4.1.12 |
||
rubyonrails rails 4.1.10 |
||
rubyonrails rails 4.1.0 |
||
rubyonrails rails 4.0.6 |
||
rubyonrails rails 4.0.5 |
||
rubyonrails rails 4.0.1 |
||
rubyonrails ruby on rails |
||
rubyonrails rails 4.1.6 |
||
rubyonrails rails 4.1.5 |
||
rubyonrails rails 4.1.14 |
||
rubyonrails rails 4.1.13 |
||
rubyonrails rails 4.0.10 |
||
rubyonrails rails 4.0.0 |
||
rubyonrails rails 4.1.7 |
||
rubyonrails rails 4.1.2 |
||
rubyonrails rails 4.1.1 |
||
rubyonrails rails 4.0.8 |
||
rubyonrails rails 4.0.7 |
||
rubyonrails rails 4.0.3 |
||
rubyonrails rails 4.0.2 |
||
rubyonrails rails 4.1.8 |
||
rubyonrails rails 4.1.7.1 |
||
rubyonrails rails 4.0.9 |
||
rubyonrails ruby on rails 4.1.14.1 |