CVE-2016-0752
Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x...
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- December 16, 2015
- Published Date
- February 16, 2016
- Last Updated
- February 07, 2025
- Vendor
- Ruby on Rails
- Product
- Action View
- Description
- Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname.
- Tags
- Exploitation
- active
- Automatable
- Yes
- Technical Impact
- partial
CVSS Scores
CVSS v3.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVSS v2.0
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N
SSVC Information
References
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2022-03-25 00:00:00 UTC |
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Metasploit | https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/rails_dynamic_render_code_exec.rb | 2025-04-29 11:01:23 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
rails_dynamic_render_code_exec
Type: metasploit • Created: Unknown
dachidahu/CVE-2016-0752
Type: github • Created: 2016-03-18 21:10:18 UTC • Stars: 0
Timeline
-
CVE ID Reserved
-
CVE Published to Public
-
Proof of Concept Exploit Available
-
Added to KEVIntel
-
Detected by Metasploit