CVE-2015-3224

NUCLEI

Web Console <2.1.3 - XSS

Title source: llm

Description

request.rb in Web Console before 2.1.3, as used with Ruby on Rails 3.x and 4.x, does not properly restrict the use of X-Forwarded-For headers in determining a client's IP address, which allows remote attackers to bypass the whitelisted_ips protection mechanism via a crafted request.

Exploits (7)

exploitdb WORKING POC VERIFIED
by Metasploit · rubyremotemultiple
https://www.exploit-db.com/exploits/41689
nomisec WORKING POC 6 stars
by 0xEval · poc
https://github.com/0xEval/cve-2015-3224
nomisec WORKING POC 2 stars
by 0x00-0x00 · poc
https://github.com/0x00-0x00/CVE-2015-3224
nomisec WORKING POC 1 stars
by SQU4NCH · poc
https://github.com/SQU4NCH/CVE-2015-3224
nomisec WORKING POC
by Sic4rio · poc
https://github.com/Sic4rio/CVE-2015-3224
nomisec WORKING POC
by n000xy · poc
https://github.com/n000xy/CVE-2015-3224-
metasploit WORKING POC EXCELLENT
rubypocruby
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/rails_web_console_v2_code_exec.rb

Nuclei Templates (1)

Ruby on Rails Web Console - Remote Code Execution
MEDIUMby pdteam

Scores

EPSS 0.8526
EPSS Percentile 99.4%

Details

CWE
CWE-284
Status published
Products (2)
rubygems/web-console 0 - 2.1.3RubyGems
rubyonrails/web_console < 2.1.2
Published Jul 26, 2015
Tracked Since Feb 18, 2026