Arbitrary Code Injection Affecting actionpack package, versions >=4.0.0, <4.1.14.2>=4.2.0, <4.2.5.2>=3.2.0.rc1, <3.2.22.2


Severity

Recommended
0.0
high
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Mature
EPSS
94.67% (100th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Code Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUBY-ACTIONPACK-20264
  • published28 Feb 2016
  • disclosed28 Feb 2016
  • creditTobias Kraze, joernchen

Introduced: 28 Feb 2016

CVE-2016-2098  (opens in a new tab)
CWE-94  (opens in a new tab)
First added by Snyk

Overview

actionpack is a web app builder and tester on Rails. Affected versions of this Gem are vulnerable to Arbitrary Code Injection.

Details

Applications that pass unverified user input to the render method in a controller or a view may be vulnerable to a code injection.

Impacted code will look like this:

class TestController < ApplicationController
  def show
    render params[:id]
  end
end

An attacker could use the request parameters to coerce the above example to execute arbitrary ruby code.

All users running an affected release should either upgrade or use one of the workarounds immediately.

CVSS Scores

version 3.1