Sha256: 2b973e45cfe1176946fc16c6d72c499473c46dbf46d6312cc3f45d8f72ef855a

Contents?: true

Size: 926 Bytes

Versions: 1

Compression:

Stored size: 926 Bytes

Contents

---
gem: actionview
framework: rails
cve: 2020-8163
date: 2020-05-15
url: https://groups.google.com/forum/#!topic/rubyonrails-security/hWuKcHyoKh0
title: Potential remote code execution of user-provided local names in ActionView
description: |
  There was a vulnerability in versions of Rails prior to 5.0.1 that would
  allow an attacker who controlled the `locals` argument of a `render` call.

  Versions Affected:  rails < 5.0.1
  Not affected:       Applications that do not allow users to control the names of locals.
  Fixed Versions:     4.2.11.2

  Impact
  ------

  In the scenario where an attacker might be able to control the name of a
  local passed into `render`, they can acheive remote code execution.

  Workarounds
  -----------

  Until such time as the patch can be applied, application developers should
  ensure that all user-provided local names are alphanumeric.

patched_versions:
  - ">= 4.2.11.2"

Version data entries

1 entries across 1 versions & 1 rubygems

Version Path
bundler-audit-0.7.0.1 data/ruby-advisory-db/gems/actionview/CVE-2020-8163.yml