Aaron Patterson
unread,May 15, 2020, 12:34:04 PM5/15/20Sign in to reply to author
Sign in to forward
You do not have permission to delete messages in this group
Either email addresses are anonymous for this group or you need the view member email addresses permission to view the original message
to rubyonrail...@googlegroups.com, ruby-sec...@googlegroups.com
Potential remote code execution of user-provided local names in Rails < 5.0.1
There was a vulnerability in versions of Rails prior to 5.0.1 that would
allow an attacker who controlled the `locals` argument of a `render` call.
This vulnerability has been assigned the CVE identifier CVE-2020-8163.
Versions Affected: rails < 5.0.1
Not affected: Applications that do not allow users to control the names of locals.
Fixed Versions: 4.2.11.2
Impact
------
In the scenario where an attacker might be able to control the name of a
local passed into `render`, they can acheive remote code execution.
Releases
--------
Users of Rails 5.0 should upgrade to a version >= 5.0.1. This release is already
available on RubyGems.
Workarounds
-----------
Until such time as the patch can be applied, application developers should
ensure that all user-provided local names are alphanumeric.
Patches
-------
As mentioned above, we are releasing the following patch that should apply
cleanly to all releases prior to 5.0.1.
* 4-2-local-variable-restriction.patch
Credits
-------
Thanks to Marc Slemko for reporting this issue via our HackerOne bug bounty program.
4-2-local-variable-restriction.patch