Skip to content

0x00-0x00/CVE-2016-2098

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 

Repository files navigation

CVE-2016-2098

Action Pack in Ruby on Rails before 3.2.22.2, 4.x before 4.1.14.2, and 4.2.x before 4.2.5.2 allows remote attackers to execute arbitrary Ruby code by leveraging an application's unrestricted use of the render method.

Resources

Usage

To use this exploit script, you need three parameters. 1. The web page URL of the vulnerable web-server. 2. The vulnerable parameter that might inject commands. 3. A shell command to execute in the remote server.

Screenshot1

After succesfully executing the exploit, you'll be able to read the output of your command, somewhere in the response page, like below:

Screenshot2

Author

I am not the author of the vulnerability.

I am the author of this exploit program written in Golang.

If you decide to use it or modify it in any way, please don't strip the credits from it.

About

Ruby On Rails unrestricted render() exploit

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages