Vulnerability Details : CVE-2016-2097
Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.2 and 4.x before 4.1.14.2 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0752.
Vulnerability category: Directory traversal
Threat overview for CVE-2016-2097
Top countries where our scanners detected CVE-2016-2097
Top open port discovered on systems with this issue
80
IPs affected by CVE-2016-2097 208
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2016-2097!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2016-2097
Probability of exploitation activity in the next 30 days: 1.10%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 82 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2016-2097
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
5.3
|
MEDIUM | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
3.9
|
1.4
|
NIST |
CWE ids for CVE-2016-2097
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: nvd@nist.gov (Primary)
References for CVE-2016-2097
-
http://www.securitytracker.com/id/1035122
Rails Bugs Let Remote Users View Files and Execute Arbitrary Code - SecurityTracker
-
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00080.html
[security-announce] openSUSE-SU-2016:0835-1: important: Security update
-
http://www.debian.org/security/2016/dsa-3509
Debian -- Security Information -- DSA-3509-1 rails
-
https://groups.google.com/forum/message/raw?msg=rubyonrails-security/ddY6HgqB2z4/we0RasMZIAAJ
-
http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00006.html
[security-announce] SUSE-SU-2016:0967-1: important: Security update for
-
http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00083.html
[security-announce] SUSE-SU-2016:0854-1: important: Security update for
-
http://weblog.rubyonrails.org/2016/2/29/Rails-4-2-5-2-4-1-14-2-3-2-22-2-have-been-released/
Rails 4.2.5.2, 4.1.14.2 and 3.2.22.2 have been released! | Riding RailsPatch;Vendor Advisory
-
http://www.securityfocus.com/bid/83726
Ruby on Rails Action View CVE-2016-2097 Incomplete Fix Directory Traversal Vulnerability
Products affected by CVE-2016-2097
- cpe:2.3:a:rubyonrails:ruby_on_rails:*:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:ruby_on_rails:4.1.14.1:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.0.1:rc1:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.0.0:beta:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.0.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.0.0:-:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.0.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.0.1:rc2:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.0.1:rc3:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.1.0:beta1:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.0.1:-:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.0.1:rc4:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.1.0:-:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.0.6:rc2:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.1.2:rc3:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.1.2:rc2:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.1.2:rc1:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.0.6:rc1:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.0.6:rc3:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.0.10:rc1:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.1.6:rc1:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.1.7:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.1.8:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.1.7.1:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.1.0:beta2:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.0.4:rc1:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.1.13:rc1:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.1.10:rc2:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.1.10:rc1:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.1.12:rc1:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.1.9:rc1:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.1.0:rc2:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.1.0:rc1:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.1.14:rc2:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.1.14:rc1:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.1.10:rc4:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.1.10:rc3:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:4.1.6:rc2:*:*:*:*:*:*