forked from qaseleniumtesting01/ridemo
-
Notifications
You must be signed in to change notification settings - Fork 1
CVE-2016-0752 High Severity Vulnerability detected by WhiteSource #110
Copy link
Copy link
Open
Labels
security vulnerabilitySecurity vulnerability detected by WhiteSourceSecurity vulnerability detected by WhiteSource
Description
CVE-2016-0752 - High Severity Vulnerability
Vulnerable Library - rails-3.0.9.gem
path: /ridemo/Gemfile.lock
Library home page: http://rubygems.org/gems/rails-3.0.9.gem
Dependency Hierarchy:
- ❌ rails-3.0.9.gem (Vulnerable Library)
Vulnerability Details
Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname.
Publish Date: 2016-02-16
URL: CVE-2016-0752
CVSS 3 Score Details (7.5)
Base Score Metrics:
- Exploitability Metrics:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None
- User Interaction: None
- Scope: Unchanged
- Impact Metrics:
- Confidentiality Impact: High
- Integrity Impact: None
- Availability Impact: None
Step up your Open Source Security Game with WhiteSource here
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
security vulnerabilitySecurity vulnerability detected by WhiteSourceSecurity vulnerability detected by WhiteSource