CVE-2020-8164Deserialization of Untrusted Data in Rails

Severity
7.5HIGHNVD
EPSS
7.4%
top 8.25%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 19

Description

A deserialization of untrusted data vulnerability exists in rails < 5.2.4.3, rails < 6.0.3.1 which can allow an attacker to supply information can be inadvertently leaked fromStrong Parameters.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages6 packages

NVDrubyonrails/rails6.0.06.0.3.1+1
Debianrubyonrails/rails< 2:5.2.4.3+dfsg-1+3
CVEListV5https/github.com_rails_rails5.2.4.3, 6.0.3.1
RubyGemsactionpack_project/actionpack5.0.05.2.4.3+1
NVDopensuse/leap15.1, 15.2+1

Also affects: Debian Linux 10.0, 8.0, 9.0

Patches

🔴Vulnerability Details

4
CVEList
CVE-2020-8164: A deserialization of untrusted data vulnerability exists in rails < 52020-06-19
OSV
CVE-2020-8164: A deserialization of untrusted data vulnerability exists in rails < 52020-06-19
OSV
Possible Strong Parameters Bypass in ActionPack2020-05-26
GHSA
Possible Strong Parameters Bypass in ActionPack2020-05-26

📋Vendor Advisories

2
Red Hat
rubygem-actionpack: possible strong parameters bypass2020-05-18
Debian
CVE-2020-8164: rails - A deserialization of untrusted data vulnerability exists in rails < 5.2.4.3, rai...2020

💬Community

2
Bugzilla
CVE-2020-8164 rubygem-actionpack: possible strong parameters bypass2020-06-01
Bugzilla
CVE-2020-8164 rubygem-actionpack: possible strong parameters bypass [fedora-all]2020-06-01
CVE-2020-8164 — Deserialization of Untrusted Data | cvebase