7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.1 High
AI Score
Confidence
High
0.666 Medium
EPSS
Percentile
97.9%
A deserialization of untrusted data vulnernerability exists in rails < 5.2.4.3, rails < 6.0.3.1 that can allow an attacker to unmarshal user-provided objects in MemCacheStore and RedisCacheStore potentially resulting in an RCE.
CPE | Name | Operator | Version |
---|---|---|---|
rubyonrails:rails | rubyonrails rails | lt | 5.2.4.3 |
rubyonrails:rails | rubyonrails rails | lt | 6.0.3.1 |
[
{
"product": "https://github.com/rails/rails",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Fixed in 5.2.4.3, 6.0.3.1"
}
]
}
]
lists.opensuse.org/opensuse-security-announce/2020-10/msg00031.html
lists.opensuse.org/opensuse-security-announce/2020-10/msg00034.html
groups.google.com/g/rubyonrails-security/c/bv6fW4S0Y1c
hackerone.com/reports/413388
lists.debian.org/debian-lts-announce/2020/06/msg00022.html
lists.debian.org/debian-lts-announce/2020/07/msg00013.html
weblog.rubyonrails.org/2020/5/18/Rails-5-2-4-3-and-6-0-3-1-have-been-released/
www.debian.org/security/2020/dsa-4766
More
7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
9.8 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
9.1 High
AI Score
Confidence
High
0.666 Medium
EPSS
Percentile
97.9%