Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.2 and 4.x before 4.1.14.2 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0752.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "4.0.0-NA"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.0-beta"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.0-rc1"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.0-rc2"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.1-NA"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.1-rc1"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.1-rc2"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.1-rc3"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.1-rc4"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.2"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.3"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.4"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.4-rc1"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.5"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.6"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.6-rc1"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.6-rc2"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.6-rc3"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.7"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.8"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.9"
},
{
"introduced": "0"
},
{
"last_affected": "4.0.10-rc1"
},
{
"introduced": "0"
},
{
"last_affected": "4.1.0-NA"
},
{
"introduced": "0"
},
{
"last_affected": "4.1.0-beta1"
},
{
"introduced": "0"
},
{
"last_affected": "4.1.0-beta2"
},
{
"introduced": "0"
},
{
"last_affected": "4.1.0-rc1"
},
{
"introduced": "0"
},
{
"last_affected": "4.1.0-rc2"
},
{
"introduced": "0"
},
{
"last_affected": "4.1.1"
},
{
"introduced": "0"
},
{
"last_affected": "4.1.2"
},
{
"introduced": "0"
},
{
"last_affected": "4.1.2-rc1"
},
{
"introduced": "0"
},
{
"last_affected": "4.1.2-rc2"
},
{
"introduced": "0"
},
{
"last_affected": "4.1.2-rc3"
},
{
"introduced": "0"
},
{
"last_affected": "4.1.3"
},
{
"introduced": "0"
},
{
"last_affected": "4.1.4"
},
{
"introduced": "0"
},
{
"last_affected": "4.1.5"
},
{
"introduced": "0"
},
{
"last_affected": "4.1.6-rc1"
},
{
"introduced": "0"
},
{
"last_affected": "4.1.6-rc2"
},
{
"introduced": "0"
},
{
"last_affected": "4.1.7"
},
{
"introduced": "0"
},
{
"last_affected": "4.1.7.1"
},
{
"introduced": "0"
},
{
"last_affected": "4.1.8"
},
{
"introduced": "0"
},
{
"last_affected": "4.1.9-rc1"
},
{
"introduced": "0"
},
{
"last_affected": "4.1.10-rc1"
},
{
"introduced": "0"
},
{
"last_affected": "4.1.10-rc2"
},
{
"introduced": "0"
},
{
"last_affected": "4.1.10-rc3"
},
{
"introduced": "0"
},
{
"last_affected": "4.1.10-rc4"
},
{
"introduced": "0"
},
{
"last_affected": "4.1.12-rc1"
},
{
"introduced": "0"
},
{
"last_affected": "4.1.13-rc1"
},
{
"introduced": "0"
},
{
"last_affected": "4.1.14-rc1"
},
{
"introduced": "0"
},
{
"last_affected": "4.1.14-rc2"
},
{
"introduced": "0"
},
{
"last_affected": "3.2.22.1"
},
{
"introduced": "0"
},
{
"last_affected": "4.1.14.1"
}
]
}