CVE-2020-8165

CRITICAL

Rails <5.2.4.3-6.0.3.1 - Deserialization

Title source: llm

Description

A deserialization of untrusted data vulnernerability exists in rails < 5.2.4.3, rails < 6.0.3.1 that can allow an attacker to unmarshal user-provided objects in MemCacheStore and RedisCacheStore potentially resulting in an RCE.

Exploits (8)

nomisec WORKING POC 41 stars
by masahiro331 · poc
https://github.com/masahiro331/CVE-2020-8165
nomisec WORKING POC 4 stars
by hybryx · poc
https://github.com/hybryx/CVE-2020-8165
nomisec WORKING POC 1 stars
by danielklim · poc
https://github.com/danielklim/cve-2020-8165-demo
nomisec WORKING POC 1 stars
by umiterkol · poc
https://github.com/umiterkol/CVE-2020-8165--Auto-Shell
nomisec WORKING POC
by progfay · poc
https://github.com/progfay/CVE-2020-8165
gitlab STUB
by gonzoyumo · poc
https://gitlab.com/gonzoyumo/test-rails-cve-2020-8165
nomisec WORKING POC
by taipansec · poc
https://github.com/taipansec/CVE-2020-8165
nomisec WORKING POC
by AssassinUKG · poc
https://github.com/AssassinUKG/CVE-2020-8165

Scores

CVSS v3 9.8
EPSS 0.9013
EPSS Percentile 99.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-502
Status published

Affected Products (7)

rubyonrails/rails < 5.2.4.3
debian/debian_linux
debian/debian_linux
debian/debian_linux
opensuse/leap
opensuse/leap
rubygems/activesupport < 5.2.4.3RubyGems

Timeline

Published Jun 19, 2020
Tracked Since Feb 18, 2026