CVE-2016-2098
HIGHDebian Linux < 3.2.22.1 - Improper Input Validation
Title source: ruleDescription
Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method.
Exploits (15)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremoteruby
https://www.exploit-db.com/exploits/40086
nomisec
WORKING POC
2 stars
by DanielHemmati · poc
https://github.com/DanielHemmati/CVE-2016-2098-my-first-exploit
nomisec
WORKING POC
1 stars
by Alejandro-MartinG · poc
https://github.com/Alejandro-MartinG/rails-PoC-CVE-2016-2098
nomisec
WORKING POC
1 stars
by CyberDefenseInstitute · poc
https://github.com/CyberDefenseInstitute/PoC_CVE-2016-2098_Rails42
nomisec
WORKING POC
by JoseLRC97 · poc
https://github.com/JoseLRC97/Ruby-on-Rails-ActionPack-Inline-ERB-Remote-Code-Execution
metasploit
WORKING POC
EXCELLENT
rubypocruby
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/rails_actionpack_inline_exec.rb
References (12)
Scores
CVSS v3
7.3
EPSS
0.8743
EPSS Percentile
99.5%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Details
CWE
CWE-20
Status
published
Products (28)
debian/debian_linux
8.0
rubygems/actionpack
3.0.0 - 3.2.22.2RubyGems
rubyonrails/rails
4.0.0 (4 CPE variants)
rubyonrails/rails
4.0.1 (5 CPE variants)
rubyonrails/rails
4.0.2
rubyonrails/rails
4.0.3
rubyonrails/rails
4.0.4 (2 CPE variants)
rubyonrails/rails
4.0.5
rubyonrails/rails
4.0.6 (4 CPE variants)
rubyonrails/rails
4.0.7
... and 18 more
Published
Apr 07, 2016
Tracked Since
Feb 18, 2026