CVE-2015-3224
NUCLEIWeb Console <2.1.3 - XSS
Title source: llmDescription
request.rb in Web Console before 2.1.3, as used with Ruby on Rails 3.x and 4.x, does not properly restrict the use of X-Forwarded-For headers in determining a client's IP address, which allows remote attackers to bypass the whitelisted_ips protection mechanism via a crafted request.
Exploits (7)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotemultiple
https://www.exploit-db.com/exploits/41689
metasploit
WORKING POC
EXCELLENT
rubypocruby
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/rails_web_console_v2_code_exec.rb
Nuclei Templates (1)
Ruby on Rails Web Console - Remote Code Execution
MEDIUMby pdteam
References (5)
Scores
EPSS
0.8526
EPSS Percentile
99.4%
Details
CWE
CWE-284
Status
published
Products (2)
rubygems/web-console
0 - 2.1.3RubyGems
rubyonrails/web_console
< 2.1.2
Published
Jul 26, 2015
Tracked Since
Feb 18, 2026