⚠ Actively exploited
Added to CISA KEV on 2022-03-25. Federal agencies required to patch by 2022-04-15. Required action: Apply updates per vendor instructions..
CVE-2016-0752 — Path Traversal in Rails
Severity
7.5HIGHNVD
EPSS
91.1%
top 0.36%
CISA KEV
KEV
Added 2022-03-25
Due 2022-04-15
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedFeb 16
KEV addedMar 25
KEV dueApr 15
CISA Required Action: Apply updates per vendor instructions.
Description
Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6
Affected Packages8 packages
Also affects: Debian Linux 8.0
🔴Vulnerability Details
8💥Exploits & PoCs
1Exploit-DB
▶
📋Vendor Advisories
4Red Hat
▶
Debian▶
CVE-2016-0752: rails - Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22....↗2016