Vulnerabilidad en Action Pack on Ruby en Rails (CVE-2016-2098)
Gravedad CVSS v3.1:
ALTA
Tipo:
CWE-20
Validación incorrecta de entrada
Fecha de publicación:
07/04/2016
Última modificación:
12/04/2025
Descripción
Action Pack en Ruby on Rails en versiones anteriores a 3.2.22.2, 4.x en versiones anteriores a 4.1.14.2 y 4.2.x en versiones anteriores a 4.2.5.2 permite a atacantes remotos ejecutar código Ruby arbitrario aprovechando el uso no restringido del método render de una aplicación.
Impacto
Puntuación base 3.x
7.30
Gravedad 3.x
ALTA
Puntuación base 2.0
7.50
Gravedad 2.0
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:4.0.0:-:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:4.0.0:beta:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:4.0.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:4.0.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:4.0.1:-:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:4.0.1:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:4.0.1:rc2:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:4.0.1:rc3:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:4.0.1:rc4:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:4.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:4.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:4.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:4.0.4:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:rubyonrails:rails:4.0.5:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00057.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00080.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00083.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00086.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html
- http://weblog.rubyonrails.org/2016/2/29/Rails-4-2-5-2-4-1-14-2-3-2-22-2-have-been-released/
- http://www.debian.org/security/2016/dsa-3509
- http://www.securityfocus.com/bid/83725
- http://www.securitytracker.com/id/1035122
- https://groups.google.com/forum/message/raw?msg=rubyonrails-security/ly-IH-fxr_Q/WLoOhcMZIAAJ
- https://www.exploit-db.com/exploits/40086/
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00057.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00080.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00083.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00086.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00053.html
- http://weblog.rubyonrails.org/2016/2/29/Rails-4-2-5-2-4-1-14-2-3-2-22-2-have-been-released/
- http://www.debian.org/security/2016/dsa-3509
- http://www.securityfocus.com/bid/83725
- http://www.securitytracker.com/id/1035122
- https://groups.google.com/forum/message/raw?msg=rubyonrails-security/ly-IH-fxr_Q/WLoOhcMZIAAJ
- https://www.exploit-db.com/exploits/40086/



