A remote code execution vulnerability in development mode Rails <5.2.2.1, <6.0.0.beta3 can allow an attacker to guess the automatically generated development mode secret token. This secret token can be used in combination with other Rails internals to escalate to a remote code execution exploit.
CPE | Name | Operator | Version |
---|---|---|---|
debian_linux | eq | 8.0 | |
fedora | eq | 30 | |
rails | lt | 5.2.2.1 | |
rails | eq | 6.0.0 beta1 | |
rails | eq | 6.0.0 beta2 |
packetstormsecurity.com/files/152704/Ruby-On-Rails-DoubleTap-Development-Mode-secret_key_base-Remote-Code-Execution.html
groups.google.com/forum/
lists.fedoraproject.org/archives/list/[email protected]/message/Y43636TH4D6T46IC6N2RQVJTRFJAAYGA/
weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/
www.exploit-db.com/exploits/46785/