A remote code execution vulnerability in development mode Rails <5.2.2.1, <6.0.0.beta3 can allow an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.
The product uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Rails | Rubyonrails | * | 5.2.2.1 (excluding) |
Rails | Rubyonrails | 6.0.0-beta1 (including) | 6.0.0-beta1 (including) |
Rails | Rubyonrails | 6.0.0-beta2 (including) | 6.0.0-beta2 (including) |
Rails | Ubuntu | cosmic | * |
Rails | Ubuntu | disco | * |
Rails-4.0 | Ubuntu | trusty | * |
Ruby-actionpack-3.2 | Ubuntu | trusty | * |
Ruby-activemodel-3.2 | Ubuntu | trusty | * |
Ruby-activerecord-3.2 | Ubuntu | trusty | * |
Ruby-activesupport-3.2 | Ubuntu | trusty | * |
Ruby-rails-3.2 | Ubuntu | trusty | * |