Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.1, 4.0.x and 4.1.x before 4.1.14.1, 4.2.x before 4.2.5.1, and 5.x before 5.0.0.beta1.1 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-604-1 | ruby-actionpack-3.2 security update |
![]() |
DSA-3464-1 | rails security update |
![]() |
DSA-3509-1 | rails security update |
![]() |
GHSA-xrr4-p6fq-hjg7 | Directory traversal vulnerability in Action View in Ruby on Rails |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 07 Feb 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
kev
|
Wed, 14 Aug 2024 00:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-07-30T01:46:40.690Z
Reserved: 2015-12-16T00:00:00.000Z
Link: CVE-2016-0752

Updated: 2024-08-05T22:30:03.939Z

Status : Deferred
Published: 2016-02-16T02:59:06.783
Modified: 2025-04-12T10:46:40.837
Link: CVE-2016-0752


No data.