A remote code execution vulnerability in development mode Rails <5.2.2.1, <6.0.0.beta3 can allow an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.
The product uses insufficiently random numbers or values in a security context that depends on unpredictable numbers.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Rails | Rubyonrails | * | 5.2.2.1 (excluding) |
Rails | Rubyonrails | 6.0.0-beta1 (including) | 6.0.0-beta1 (including) |
Rails | Rubyonrails | 6.0.0-beta2 (including) | 6.0.0-beta2 (including) |