You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.2 and 4.x before 4.1.14.2 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0752.
CVE-2016-2097 - Medium Severity Vulnerability
path: /app1/Gemfile.lock
Library home page: http://rubygems.org/gems/rails-4.1.0.gem
Dependency Hierarchy:
Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.2 and 4.x before 4.1.14.2 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0752.
Publish Date: 2016-04-07
URL: CVE-2016-2097
Base Score Metrics:
Type: Upgrade version
Origin: http://www.securitytracker.com/id/1035122
Release Date: 2017-12-31
Fix Resolution: The vendor has issued a fix (3.2.22.2, 4.1.14.2, 4.2.5.2).
The vendor's advisory is available at:
http://weblog.rubyonrails.org/2016/2/29/Rails-4-2-5-2-4-1-14-2-3-2-22-2-have-been-released/
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: