CVE-2016-0752
Find out more about CVE-2016-0752 from the MITRE CVE dictionary dictionary and NIST NVD.
CVSS v2 metrics
| Base Score | 6.8 |
|---|---|
| Base Metrics | AV:N/AC:M/Au:N/C:P/I:P/A:P |
| Access Vector | Network |
| Access Complexity | Medium |
| Authentication | None |
| Confidentiality Impact | Partial |
| Integrity Impact | Partial |
| Availability Impact | Partial |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Red Hat Security Errata
| Platform | Errata | Release Date |
|---|---|---|
| Red Hat Software Collections for Red Hat Enterprise Linux 7 | RHSA-2016:0296 | 2016-02-24 |
| Red Hat Software Collections for Red Hat Enterprise Linux 7 (ruby193-rubygem-actionpack) | RHSA-2016:0455 | 2016-03-15 |
| Red Hat Software Collections for Red Hat Enterprise Linux 7 (ror40-rubygem-actionpack) | RHSA-2016:0454 | 2016-03-15 |
| Red Hat Software Collections for Red Hat Enterprise Linux 6 | RHSA-2016:0296 | 2016-02-24 |
| Red Hat Software Collections for Red Hat Enterprise Linux 6 (ror40-rubygem-actionpack) | RHSA-2016:0454 | 2016-03-15 |
| Red Hat Software Collections for Red Hat Enterprise Linux 6 (ruby193-rubygem-actionpack) | RHSA-2016:0455 | 2016-03-15 |
Affected Packages State
| Platform | Package | State |
|---|---|---|
| Red Hat Subscription Asset Manager 1 | ruby193-rubygem-actionpack | Will not fix |
| Red Hat Subscription Asset Manager 1 | rubygem-actionpack | Will not fix |
Acknowledgements
Red Hat would like to thank Ruby on Rails project for reporting this issue. Upstream acknowledges John Poulin as the original reporter.Mitigation
Avoid passing untrusted input to render method, or verify the input using whitelist before passing it to the render method:
def index
render verify_template(params[:id])
end
private
def verify_template(name)
# add verification logic particular to your application here
end
