CVE-2016-2097
Published Apr 7, 2016
Last updated 5 years ago
Overview
- Description
- Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.2 and 4.x before 4.1.14.2 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0752.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 5.3
- Impact score
- 1.4
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-22
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2E950E33-CD03-45F5-83F9-F106060B4A8B" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "547C62C8-4B3E-431B-AA73-5C42ED884671" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4CDAD329-35F7-4C82-8019-A0CF6D069059" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "56D3858B-0FEE-4E8D-83C2-68AF0431F478" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "254884EE-EBA4-45D0-9704-B5CB22569668" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "35FC7015-267C-403B-A23D-EDA6223D2104" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5C913A56-959D-44F1-BD89-D246C66D1F09" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5D5BA926-38EE-47BE-9D16-FDCF360A503B" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.1:rc4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18EA25F1-279A-4F1A-883D-C064369F592E" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD794856-6F30-4ABF-8AE4-720BB75E6F89" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B4199B8B-A6F9-4BFD-8D27-0E663D8C579D" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F11E76A3-FA5B-4038-AB52-3D7D5E54D8A2" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.4:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C583ACDE-55D5-4D2F-838F-BEC5BDCDE3B7" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "767C481D-6616-4CA9-9A9B-C994D9121796" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5496953-0C5E-45F8-A7FB-240CEC2CCEB8" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.6:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CA46B621-125E-497F-B2DE-91C989B25936" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.6:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B3239443-2E19-4540-BA0C-05A27E44CB6C" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.6:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "104AC9CF-6611-4469-9852-7FDAF4EC7638" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DC9E1864-B1E5-42C3-B4AF-9A002916B66D" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "31AC91AA-6A9A-43B4-B3E9-A66A34B6E612" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A462C151-982E-4A83-A376-025015F40645" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.0.10:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "578CC013-776B-4868-B448-B7ACAF3AF832" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C310EA3E-399A-48FD-8DE9-6950E328CF23" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "293B2998-5169-4960-BEC4-21DAC837E32B" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FB42A8E7-D273-4CE2-9182-D831D8089BFA" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB757DFD-BF47-4483-A2C0-DF37F7D10989" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B6C375F2-5027-4B55-9112-C5DD2F787E43" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EAB8D57F-9849-428C-B8E9-D0A1020728BB" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B0359DA8-6B41-46C5-AA95-41B1B366DD4A" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.2:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0965BDB6-9644-465C-AA32-9278B2D53197" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.2:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7F6B15CF-37C1-4C9B-8457-4A8C9A480188" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.2:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "072EB16D-1325-4869-B156-65E786A834C7" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "847B3C3D-8656-404D-A954-09C159EDC8E2" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "65CA2D50-B33C-4088-BDDF-EB964C9A092C" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CADB5989-5260-4F60-ACF2-BEB6D7F97654" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.6:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "509597D0-22E1-4BE8-95AD-C54FE4D15FA4" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.6:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B86E26CB-2376-4EBC-913C-B354E2D6711B" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "539C550D-FEDD-415E-95AE-40E1AE2BAF1A" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D5150753-E86D-4859-A046-97B83EAE2C14" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "59C5B869-74FC-4051-A103-A721332B3CF2" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.9:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F11E9791-7BCE-43E5-A4BA-6449623FE4F9" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.10:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE521626-2876-455C-9D99-DB74726DC724" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.10:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2DFDD32E-F49E-47F7-B033-B6C3C0E07FC4" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.10:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DCBA26F1-FBBA-444D-9C14-F15AB14A4FC5" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.10:rc4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "16D3B0EA-49F7-401A-A1D9-437429D33EAD" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.12:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "17EBD8B4-C4D3-44A6-9DC1-89D948F126A1" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.13:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FCB08CD7-E9B9-454F-BAF7-96162D177677" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.14:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D3DA0B4-E374-4ED4-8C3B-F723C968666F" }, { "criteria": "cpe:2.3:a:rubyonrails:rails:4.1.14:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B1730A9A-6810-4470-AE6C-A5356D5BFF43" }, { "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DBD4FBDC-F05B-4CDD-8928-7122397A7651", "versionEndIncluding": "3.2.22.1" }, { "criteria": "cpe:2.3:a:rubyonrails:ruby_on_rails:4.1.14.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "91AB2B26-A6F1-44D2-92EB-8078DD6FD63A" } ], "operator": "OR" } ] } ]