A deserialization of untrusted data vulnernerability exists in rails < 5.2.4.3, rails < 6.0.3.1 that can allow an attacker to unmarshal user-provided objects in MemCacheStore and RedisCacheStore potentially resulting in an RCE.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
https://hackerone.com/reports/413388 | patch third party advisory exploit |
https://groups.google.com/g/rubyonrails-security/c/bv6fW4S0Y1c | patch mailing list third party advisory |
https://lists.debian.org/debian-lts-announce/2020/06/msg00022.html | third party advisory mailing list |
https://weblog.rubyonrails.org/2020/5/18/Rails-5-2-4-3-and-6-0-3-1-have-been-released/ | vendor advisory |
https://lists.debian.org/debian-lts-announce/2020/07/msg00013.html | third party advisory mailing list |
https://www.debian.org/security/2020/dsa-4766 | third party advisory vendor advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00031.html | vendor advisory mailing list third party advisory |
http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00034.html | vendor advisory mailing list third party advisory |
https://security.netapp.com/advisory/ntap-20250509-0002/ |