You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method.
CVE-2016-2098 - High Severity Vulnerability
path: /app1/Gemfile.lock
Library home page: http://rubygems.org/gems/rails-4.1.0.gem
Dependency Hierarchy:
Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method.
Publish Date: 2016-04-07
URL: CVE-2016-2098
Base Score Metrics:
Type: Upgrade version
Origin: http://www.securitytracker.com/id/1035122
Release Date: 2017-12-31
Fix Resolution: The vendor has issued a fix (3.2.22.2, 4.1.14.2, 4.2.5.2).
The vendor's advisory is available at:
http://weblog.rubyonrails.org/2016/2/29/Rails-4-2-5-2-4-1-14-2-3-2-22-2-have-been-released/
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: