Rails.Dynamic.Template.Render.Arbitrary.Command.Execution
Description
This indicates an attack attempt to exploit a Directory Traversal and Arbitrary Command Execution Vulnerability in Ruby on Rails.
The vulnerability is due to the application passing unverified user input to the `render` method in a controller. A remote attacker could exploit this to execute arbitrary code execution within the context of the application, via a crafted HTTP request.
Affected Products
Ruby on Rails all versions prior to 5.0.0.beta1.1, 4.2.5.1, 4.1.14.1, and 3.2.22.1
Impact
System Compromise: Remote attackers can gain control of vulnerable systems.
Recommended Actions
Apply the update available from the website
http://weblog.rubyonrails.org/2016/1/25/Rails-5-0-0-beta1-1-4-2-5-1-4-1-14-1-3-2-22-1-and-rails-html-sanitizer-1-0-3-have-been-released/
Coverage
| IPS (Regular DB) | |
| IPS (Extended DB) |