Description A deserialization of untrusted data vulnerability exists in rails < 5.2.4.3, rails < 6.0.3.1 which can allow an attacker to supply information can be inadvertently leaked fromStrong Parameters.
CVSS vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Exploitability: 3.9 | Impact: 3.6 Attack Vector: Network
Complexity: Low
Privileges: None
User Interaction: None
Scope: Unchanged
Confidentiality: High
Integrity: None
Availability: None
Affected Packages6 packages Show 1 more packages Also affects: Debian Linux 10.0, 8.0, 9.0
🔴 Vulnerability Details4 CVEList CVE-2020-8164: A deserialization of untrusted data vulnerability exists in rails < 5 ↗ 2020-06-19 ▶ OSV CVE-2020-8164: A deserialization of untrusted data vulnerability exists in rails < 5 ↗ 2020-06-19 ▶ OSV Possible Strong Parameters Bypass in ActionPack ↗ 2020-05-26 ▶ GHSA Possible Strong Parameters Bypass in ActionPack ↗ 2020-05-26 ▶
📋 Vendor Advisories2 Red Hat rubygem-actionpack: possible strong parameters bypass ↗ 2020-05-18 ▶ Debian CVE-2020-8164: rails - A deserialization of untrusted data vulnerability exists in rails < 5.2.4.3, rai... ↗ 2020 ▶
💬 Community2 Bugzilla CVE-2020-8164 rubygem-actionpack: possible strong parameters bypass ↗ 2020-06-01 ▶ Bugzilla CVE-2020-8164 rubygem-actionpack: possible strong parameters bypass [fedora-all] ↗ 2020-06-01 ▶