CVE-2016-2097
Summary
| CVE | CVE-2016-2097 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2016-04-07 23:59:00 UTC |
| Updated | 2019-08-08 15:43:00 UTC |
| Description | Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.2 and 4.x before 4.1.14.2 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0752. |
Risk And Classification
Problem Types: CWE-22
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Rubyonrails | Rails | 4.0.0 | - | All | All |
| Application | Rubyonrails | Rails | 4.0.0 | beta | All | All |
| Application | Rubyonrails | Rails | 4.0.0 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.0.0 | rc2 | All | All |
| Application | Rubyonrails | Rails | 4.0.1 | - | All | All |
| Application | Rubyonrails | Rails | 4.0.1 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.0.1 | rc2 | All | All |
| Application | Rubyonrails | Rails | 4.0.1 | rc3 | All | All |
| Application | Rubyonrails | Rails | 4.0.1 | rc4 | All | All |
| Application | Rubyonrails | Rails | 4.0.10 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.0.2 | All | All | All |
| Application | Rubyonrails | Rails | 4.0.3 | All | All | All |
| Application | Rubyonrails | Rails | 4.0.4 | All | All | All |
| Application | Rubyonrails | Rails | 4.0.4 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.0.5 | All | All | All |
| Application | Rubyonrails | Rails | 4.0.6 | All | All | All |
| Application | Rubyonrails | Rails | 4.0.6 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.0.6 | rc2 | All | All |
| Application | Rubyonrails | Rails | 4.0.6 | rc3 | All | All |
| Application | Rubyonrails | Rails | 4.0.7 | All | All | All |
| Application | Rubyonrails | Rails | 4.0.8 | All | All | All |
| Application | Rubyonrails | Rails | 4.0.9 | All | All | All |
| Application | Rubyonrails | Rails | 4.1.0 | - | All | All |
| Application | Rubyonrails | Rails | 4.1.0 | beta1 | All | All |
| Application | Rubyonrails | Rails | 4.1.0 | beta2 | All | All |
| Application | Rubyonrails | Rails | 4.1.0 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.1.0 | rc2 | All | All |
| Application | Rubyonrails | Rails | 4.1.1 | All | All | All |
| Application | Rubyonrails | Rails | 4.1.10 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.1.10 | rc2 | All | All |
| Application | Rubyonrails | Rails | 4.1.10 | rc3 | All | All |
| Application | Rubyonrails | Rails | 4.1.10 | rc4 | All | All |
| Application | Rubyonrails | Rails | 4.1.12 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.1.13 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.1.14 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.1.14 | rc2 | All | All |
| Application | Rubyonrails | Rails | 4.1.2 | All | All | All |
| Application | Rubyonrails | Rails | 4.1.2 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.1.2 | rc2 | All | All |
| Application | Rubyonrails | Rails | 4.1.2 | rc3 | All | All |
| Application | Rubyonrails | Rails | 4.1.3 | All | All | All |
| Application | Rubyonrails | Rails | 4.1.4 | All | All | All |
| Application | Rubyonrails | Rails | 4.1.5 | All | All | All |
| Application | Rubyonrails | Rails | 4.1.6 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.1.6 | rc2 | All | All |
| Application | Rubyonrails | Rails | 4.1.7 | All | All | All |
| Application | Rubyonrails | Rails | 4.1.7.1 | All | All | All |
| Application | Rubyonrails | Rails | 4.1.8 | All | All | All |
| Application | Rubyonrails | Rails | 4.1.9 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.0.0 | - | All | All |
| Application | Rubyonrails | Rails | 4.0.0 | beta | All | All |
| Application | Rubyonrails | Rails | 4.0.0 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.0.0 | rc2 | All | All |
| Application | Rubyonrails | Rails | 4.0.1 | - | All | All |
| Application | Rubyonrails | Rails | 4.0.1 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.0.1 | rc2 | All | All |
| Application | Rubyonrails | Rails | 4.0.1 | rc3 | All | All |
| Application | Rubyonrails | Rails | 4.0.1 | rc4 | All | All |
| Application | Rubyonrails | Rails | 4.0.10 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.0.2 | All | All | All |
| Application | Rubyonrails | Rails | 4.0.3 | All | All | All |
| Application | Rubyonrails | Rails | 4.0.4 | All | All | All |
| Application | Rubyonrails | Rails | 4.0.4 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.0.5 | All | All | All |
| Application | Rubyonrails | Rails | 4.0.6 | All | All | All |
| Application | Rubyonrails | Rails | 4.0.6 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.0.6 | rc2 | All | All |
| Application | Rubyonrails | Rails | 4.0.6 | rc3 | All | All |
| Application | Rubyonrails | Rails | 4.0.7 | All | All | All |
| Application | Rubyonrails | Rails | 4.0.8 | All | All | All |
| Application | Rubyonrails | Rails | 4.0.9 | All | All | All |
| Application | Rubyonrails | Rails | 4.1.0 | - | All | All |
| Application | Rubyonrails | Rails | 4.1.0 | beta1 | All | All |
| Application | Rubyonrails | Rails | 4.1.0 | beta2 | All | All |
| Application | Rubyonrails | Rails | 4.1.0 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.1.0 | rc2 | All | All |
| Application | Rubyonrails | Rails | 4.1.1 | All | All | All |
| Application | Rubyonrails | Rails | 4.1.10 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.1.10 | rc2 | All | All |
| Application | Rubyonrails | Rails | 4.1.10 | rc3 | All | All |
| Application | Rubyonrails | Rails | 4.1.10 | rc4 | All | All |
| Application | Rubyonrails | Rails | 4.1.12 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.1.13 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.1.14 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.1.14 | rc2 | All | All |
| Application | Rubyonrails | Rails | 4.1.2 | All | All | All |
| Application | Rubyonrails | Rails | 4.1.2 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.1.2 | rc2 | All | All |
| Application | Rubyonrails | Rails | 4.1.2 | rc3 | All | All |
| Application | Rubyonrails | Rails | 4.1.3 | All | All | All |
| Application | Rubyonrails | Rails | 4.1.4 | All | All | All |
| Application | Rubyonrails | Rails | 4.1.5 | All | All | All |
| Application | Rubyonrails | Rails | 4.1.6 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.1.6 | rc2 | All | All |
| Application | Rubyonrails | Rails | 4.1.7 | All | All | All |
| Application | Rubyonrails | Rails | 4.1.7.1 | All | All | All |
| Application | Rubyonrails | Rails | 4.1.8 | All | All | All |
| Application | Rubyonrails | Rails | 4.1.9 | rc1 | All | All |
| Application | Rubyonrails | Ruby On Rails | 4.1.14.1 | All | All | All |
| Application | Rubyonrails | Ruby On Rails | 4.1.14.1 | All | All | All |
| Application | Rubyonrails | Ruby On Rails | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| [security-announce] openSUSE-SU-2016:0835-1: important: Security update | SUSE | lists.opensuse.org | |
| [ruby-security-ann] 20160229 [CVE-2016-0752] Possible Information Leak Vulnerability in Action View | MLIST | groups.google.com | |
| [security-announce] SUSE-SU-2016:0967-1: important: Security update for | SUSE | lists.opensuse.org | |
| Rails 4.2.5.2, 4.1.14.2 and 3.2.22.2 have been released! - Riding Rails | CONFIRM | weblog.rubyonrails.org | Patch, Vendor Advisory |
| Rails Bugs Let Remote Users View Files and Execute Arbitrary Code - SecurityTracker | SECTRACK | www.securitytracker.com | |
| Ruby on Rails Action View CVE-2016-2097 Incomplete Fix Directory Traversal Vulnerability | BID | www.securityfocus.com | |
| [security-announce] SUSE-SU-2016:0854-1: important: Security update for | SUSE | lists.opensuse.org | |
| Debian -- Security Information -- DSA-3509-1 rails | DEBIAN | www.debian.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.