6.5
CVSSv2

CVE-2020-8163

Published: 02/07/2020 Updated: 24/05/2022
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 580
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

The is a code injection vulnerability in versions of Rails before 5.0.1 that wouldallow an attacker who controlled the `locals` argument of a `render` call to perform a RCE.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

rubyonrails rails

debian debian linux 9.0

Exploits

Ruby On Rails version 501 remote code execution exploit ...

Github Repositories

This is a exploit code for CVE-2020-8163

CVE-2020-8163 This is a exploit code for CVE-2020-8163 It's for educational purposes only

CVE-2020-8163 - Remote code execution of user-provided local names in Rails

CVE-2020-8163 CVE-2020-8163 - Remote code execution of user-provided local names in Rails Remote code execution of user-provided local names in Rails < 501 There was a vulnerability in versions of Rails prior to 501 that would allow an attacker who controlled the locals argument of a render call This vulnerability has been assigned the CVE identifier CVE-2020-8163

Rails-501---RCE Date: 2020-07-19 Author : Lucas Amorim (lucas@lucasamorimca) Vendor Homepage: wwwrubyonrailsorg Software Link: wwwrubyonrailsorg Version: Rails < 501 CVE-2020-8163 - Remote code execution of user-provided local names in Rails Remote code execution of user-provided local names in Rails < 501 There was a vulnerability in versions of Rails

CVE-2020-8163 - Remote code execution of user-provided local names in Rails

CVE-2020-8163 CVE-2020-8163 - Remote code execution of user-provided local names in Rails Remote code execution of user-provided local names in Rails < 501 There was a vulnerability in versions of Rails prior to 501 that would allow an attacker who controlled the locals argument of a render call This vulnerability has been assigned the CVE identifier CVE-2020-8163

Enviroment and exploit to rce test

CVE-2020-8163 Enviroment and exploit to CVE-2020-8163 Blind remote code execution of user-provided local names in Rails < 501 and < 42112 Create the enviroment create docker container mapping port 4000 to 8001 sudo docker run --rm -it -p 8001:4000 ruby:23 bash update and install some tools in container apt update &

This is a exploit code for CVE-2020-8163

CVE-2020-8163 This is a exploit code for CVE-2020-8163 It's for educational purposes only