CVE-2016-2097
Summary
| CVE | CVE-2016-2097 |
|---|---|
| State | PUBLISHED |
| Assigner | redhat |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2016-04-07 23:59:05 UTC |
| Updated | 2026-05-06 22:30:45 UTC |
| Description | Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.2 and 4.x before 4.1.14.2 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0752. |
Risk And Classification
Primary CVSS: v3.0 5.3 MEDIUM from [email protected]
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Problem Types: CWE-22 | n/a
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.0 | [email protected] | Primary | 5.3 | MEDIUM | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
| 2.0 | [email protected] | Primary | 5 | AV:N/AC:L/Au:N/C:P/I:N/A:N |
CVSS v3.0 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
NoneUser Interaction
NoneScope
UnchangedConfidentiality
LowIntegrity
NoneAvailability
NoneCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
PartialIntegrity
NoneAvailability
NoneAV:N/AC:L/Au:N/C:P/I:N/A:N
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Rubyonrails | Rails | 4.0.0 | - | All | All |
| Application | Rubyonrails | Rails | 4.0.0 | beta | All | All |
| Application | Rubyonrails | Rails | 4.0.0 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.0.0 | rc2 | All | All |
| Application | Rubyonrails | Rails | 4.0.1 | - | All | All |
| Application | Rubyonrails | Rails | 4.0.1 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.0.1 | rc2 | All | All |
| Application | Rubyonrails | Rails | 4.0.1 | rc3 | All | All |
| Application | Rubyonrails | Rails | 4.0.1 | rc4 | All | All |
| Application | Rubyonrails | Rails | 4.0.10 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.0.2 | All | All | All |
| Application | Rubyonrails | Rails | 4.0.3 | All | All | All |
| Application | Rubyonrails | Rails | 4.0.4 | All | All | All |
| Application | Rubyonrails | Rails | 4.0.4 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.0.5 | All | All | All |
| Application | Rubyonrails | Rails | 4.0.6 | All | All | All |
| Application | Rubyonrails | Rails | 4.0.6 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.0.6 | rc2 | All | All |
| Application | Rubyonrails | Rails | 4.0.6 | rc3 | All | All |
| Application | Rubyonrails | Rails | 4.0.7 | All | All | All |
| Application | Rubyonrails | Rails | 4.0.8 | All | All | All |
| Application | Rubyonrails | Rails | 4.0.9 | All | All | All |
| Application | Rubyonrails | Rails | 4.1.0 | - | All | All |
| Application | Rubyonrails | Rails | 4.1.0 | beta1 | All | All |
| Application | Rubyonrails | Rails | 4.1.0 | beta2 | All | All |
| Application | Rubyonrails | Rails | 4.1.0 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.1.0 | rc2 | All | All |
| Application | Rubyonrails | Rails | 4.1.1 | All | All | All |
| Application | Rubyonrails | Rails | 4.1.10 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.1.10 | rc2 | All | All |
| Application | Rubyonrails | Rails | 4.1.10 | rc3 | All | All |
| Application | Rubyonrails | Rails | 4.1.10 | rc4 | All | All |
| Application | Rubyonrails | Rails | 4.1.12 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.1.13 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.1.14 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.1.14 | rc2 | All | All |
| Application | Rubyonrails | Rails | 4.1.2 | All | All | All |
| Application | Rubyonrails | Rails | 4.1.2 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.1.2 | rc2 | All | All |
| Application | Rubyonrails | Rails | 4.1.2 | rc3 | All | All |
| Application | Rubyonrails | Rails | 4.1.3 | All | All | All |
| Application | Rubyonrails | Rails | 4.1.4 | All | All | All |
| Application | Rubyonrails | Rails | 4.1.5 | All | All | All |
| Application | Rubyonrails | Rails | 4.1.6 | rc1 | All | All |
| Application | Rubyonrails | Rails | 4.1.6 | rc2 | All | All |
| Application | Rubyonrails | Rails | 4.1.7 | All | All | All |
| Application | Rubyonrails | Rails | 4.1.7.1 | All | All | All |
| Application | Rubyonrails | Rails | 4.1.8 | All | All | All |
| Application | Rubyonrails | Rails | 4.1.9 | rc1 | All | All |
| Application | Rubyonrails | Ruby On Rails | 4.1.14.1 | All | All | All |
| Application | Rubyonrails | Ruby On Rails | All | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| [security-announce] openSUSE-SU-2016:0835-1: important: Security update | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | |
| Debian -- Security Information -- DSA-3509-1 rails | af854a3a-2127-422b-91ae-364da2661108 | www.debian.org | |
| Rails Bugs Let Remote Users View Files and Execute Arbitrary Code - SecurityTracker | af854a3a-2127-422b-91ae-364da2661108 | www.securitytracker.com | |
| groups.google.com/forum/message/raw | af854a3a-2127-422b-91ae-364da2661108 | groups.google.com | |
| [security-announce] SUSE-SU-2016:0967-1: important: Security update for | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | |
| Ruby on Rails Action View CVE-2016-2097 Incomplete Fix Directory Traversal Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| Rails 4.2.5.2, 4.1.14.2 and 3.2.22.2 have been released! - Riding Rails | af854a3a-2127-422b-91ae-364da2661108 | weblog.rubyonrails.org | Patch, Vendor Advisory |
| [security-announce] SUSE-SU-2016:0854-1: important: Security update for | af854a3a-2127-422b-91ae-364da2661108 | lists.opensuse.org | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.