CVE-2016-0752
HIGH KEVRuby on Rails Dynamic Render File Upload Remote Code Execution
Title source: metasploitDescription
Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname.
Exploits (4)
nomisec
WORKING POC
10 stars
by forced-request · poc
https://github.com/forced-request/rails-rce-cve-2016-0752
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotemultiple
https://www.exploit-db.com/exploits/40561
metasploit
WORKING POC
EXCELLENT
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/rails_dynamic_render_code_exec.rb
References (13)
Scores
CVSS v3
7.5
EPSS
0.9271
EPSS Percentile
99.7%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Exploitation Intel
CISA KEV
2022-03-25
VulnCheck KEV
2019-12-17
InTheWild.io
2022-03-25
ENISA EUVD
EUVD-2017-0333
Classification
CWE
CWE-22
Status
draft
Affected Products (9)
rubyonrails/rails
< 3.2.22.1
rubyonrails/rails
opensuse/leap
opensuse/opensuse
suse/linux_enterprise_module_for_containers
debian/debian_linux
redhat/software_collections
rubygems/actionview
< 4.1.14.1RubyGems
rubygems/actionpack
< 4.1.14.1RubyGems
Timeline
Published
Feb 16, 2016
KEV Added
Mar 25, 2022
Tracked Since
Feb 18, 2026