Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-2097

EPSS 1.91% · P83
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2016-2097

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.2 and 4.x before 4.1.14.2 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0752.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Ruby on Rails Action View组件目录遍历漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Ruby on Rails(Rails)是Rails核心团队开发维护的一套基于Ruby语言的开源Web应用框架,它是由大卫-海纳梅尔-韩森从美国37signals公司的项目管理工具Basecamp里分离出来的。Action View是其中的一个用于渲染视图并可以在任何Ruby代码库中使用的独立代码库。 Ruby on Rails 3.2.22.2之前版本和4.1.14.2之前4.x版本的Action View中存在目录遍历漏洞,该漏洞源于‘render’函数没有充分过滤用户提交的输入。远程攻击者可通过向应
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2016-2097

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2016-2097

登录查看更多情报信息。

Same Patch Batch · n/a · 2016-04-07 · 36 CVEs total

CVE-2016-0790CloudBees Jenkins CI和LTS 安全漏洞
CVE-2016-2510BeanShell 任意命令执行漏洞
CVE-2015-2774Erlang OTP 信息泄露漏洞
CVE-2016-0729Apache Xerces XML Parser库缓冲区错误漏洞
CVE-2016-2086Joyent Node.js 安全漏洞
CVE-2016-2216Joyent Node.js HTTP响应拆分攻击
CVE-2016-2511websvn 跨站脚本漏洞
CVE-2016-0788CloudBees Jenkins CI和LTS 远程代码执行漏洞
CVE-2016-0789CloudBees Jenkins CI和LTS CLI CRLF注入漏洞
CVE-2015-8681Huawei P8和Mate S ovisp驱动程序安全漏洞
CVE-2016-0791CloudBees Jenkins CI和LTS 安全漏洞
CVE-2016-0792CloudBees Jenkins CI和LTS 任意代码执行漏洞
CVE-2016-1531Exim Configuration File Path 安全漏洞
CVE-2016-2098Ruby on Rails Action Pack 安全漏洞
CVE-2016-2563PuTTY和KiTTY 基于栈的缓冲区溢出漏洞
CVE-2016-2789Citrix Systems XenMobile Server 跨站脚本漏洞
CVE-2016-2851libotr 整数溢出漏洞
CVE-2016-3976SAP NetWeaver AS Java 目录遍历漏洞
CVE-2016-3973SAP NetWeaver AS Java Real-Time Collaboration服务安全漏洞
CVE-2016-1019Adobe Flash Player 安全漏洞

Showing top 20 of 36 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2016-2097

No comments yet


Leave a comment