-
-
Notifications
You must be signed in to change notification settings - Fork 221
/
CVE-2020-8163.yml
30 lines (25 loc) · 959 Bytes
/
CVE-2020-8163.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
---
gem: actionview
framework: rails
cve: 2020-8163
ghsa: cr3x-7m39-c6jq
url: https://groups.google.com/forum/#!topic/rubyonrails-security/hWuKcHyoKh0
title: Potential remote code execution of user-provided local names in ActionView
date: 2020-05-15
description: |
There was a vulnerability in versions of Rails prior to 5.0.1 that would
allow an attacker who controlled the `locals` argument of a `render` call.
Versions Affected: rails < 5.0.1
Not affected: Applications that do not allow users to control the names of locals.
Fixed Versions: 4.2.11.2
Impact
------
In the scenario where an attacker might be able to control the name of a
local passed into `render`, they can acheive remote code execution.
Workarounds
-----------
Until such time as the patch can be applied, application developers should
ensure that all user-provided local names are alphanumeric.
cvss_v3: 8.8
patched_versions:
- ">= 4.2.11.2"