Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2020-8163Code Injection in Rails

CWE-94Code Injection10 documents9 sources
Severity
8.8HIGHNVD
EPSS
90.9%
top 0.37%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJul 2
Latest updateJul 26

Description

The is a code injection vulnerability in versions of Rails prior to 5.0.1 that wouldallow an attacker who controlled the `locals` argument of a `render` call to perform a RCE.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages4 packages

RubyGemsrails/actionview< 4.2.11.3
NVDrubyonrails/rails< 5.0.1
Debianrubyonrails/rails< 2:5.2.0+dfsg-2+3
CVEListV5https/github.com_rails_railsFixed in 4.2.11.2

Also affects: Debian Linux 9.0

Patches

🔴Vulnerability Details

4
OSV
Remote code execution via user-provided local names in ActionView2020-07-07
GHSA
Remote code execution via user-provided local names in ActionView2020-07-07
CVEList
CVE-2020-8163: The is a code injection vulnerability in versions of Rails prior to 52020-07-02
OSV
CVE-2020-8163: The is a code injection vulnerability in versions of Rails prior to 52020-07-02

💥Exploits & PoCs

2
Exploit-DB
Rails 5.0.1 - Remote Code Execution2020-07-26
Nuclei
Ruby on Rails <5.0.1 - Remote Code Execution

📋Vendor Advisories

2
Red Hat
rubygem-rails: potential remote code execution of user-provided local names2020-05-15
Debian
CVE-2020-8163: rails - The is a code injection vulnerability in versions of Rails prior to 5.0.1 that w...2020

💬Community

1
Bugzilla
CVE-2020-8163 rubygem-rails: potential remote code execution of user-provided local names2020-06-18
CVE-2020-8163 — Code Injection in Rubyonrails Rails | cvebase