Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.2 and 4.x before 4.1.14.2 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0752.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00006.html | vendor advisory |
http://www.debian.org/security/2016/dsa-3509 | vendor advisory |
https://groups.google.com/forum/message/raw?msg=rubyonrails-security/ddY6HgqB2z4/we0RasMZIAAJ | mailing list |
http://www.securitytracker.com/id/1035122 | vdb entry |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00083.html | vendor advisory |
http://www.securityfocus.com/bid/83726 | vdb entry |
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00080.html | vendor advisory |
http://weblog.rubyonrails.org/2016/2/29/Rails-4-2-5-2-4-1-14-2-3-2-22-2-have-been-released/ | patch vendor advisory |