CVE-2016-0752

NameCVE-2016-0752
DescriptionDirectory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-604-1, DSA-3464-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
rails (PTS)bullseye (security), bullseye2:6.0.3.7+dfsg-2+deb11u2fixed
bookworm2:6.1.7.3+dfsg-2~deb12u1fixed
sid, trixie2:6.1.7.3+dfsg-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
railssourcesqueeze(unfixed)end-of-life
railssourcewheezy(not affected)
railssourcejessie2:4.1.8-1+deb8u1DSA-3464-1
railssource(unstable)2:4.2.5.1-1
ruby-actionpack-2.3sourcewheezy(unfixed)end-of-life
ruby-actionpack-2.3source(unstable)(unfixed)
ruby-actionpack-3.2sourcewheezy3.2.6-6+deb7u3DLA-604-1
ruby-actionpack-3.2source(unstable)(unfixed)

Notes

[wheezy] - rails <not-affected> (Vulnerable code not present, is only a transitional package)
[squeeze] - rails <end-of-life> (Not supported in Squeeze LTS)

Search for package or bug name: Reporting problems