vendor:
Ruby on Rails
by:
joernchen, Ben Murphy, hdm
N/A
CVSS
N/A
Code Execution
20
CWE
Product Name: Ruby on Rails
Affected Version From: 4.0.x
Affected Version To: 4.2.x
Patch Exists: YES
Related CWE: CVE-2015-3224
CPE: a:rubyonrails:ruby_on_rails
Metasploit:
N/A
Other Scripts:
N/A
Tags: ruby,hackerone,cve,cve2015,rce,rails,intrusive
CVSS Metrics: CVSS:2.0/AV:N/AC:M/Au:N/C:N/I:P/A:N
Nuclei References:
https://www.metahackers.pro/rails-web-console-v2-whitelist-bypass-code-exec/, https://www.jomar.fr/posts/2022/basic_recon_to_rce_ii/, https://hackerone.com/reports/44513, https://nvd.nist.gov/vuln/detail/CVE-2015-3224, http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160881.html
Nuclei Metadata: {'max-request': 1, 'vendor': 'rubyonrails', 'product': 'web_console'}
Platforms Tested: Ruby
2015
Ruby on Rails Web Console (v2) Whitelist Bypass Code Execution
Ruby on Rails Web Console before 2.1.3, as used with Ruby on Rails 3.x and 4.x, does not properly restrict the use of X-Forwarded-For headers in determining a client's IP address, which allows remote attackers to bypass the whitelisted_ips protection mechanism via a crafted request to request.rb.
Mitigation:
Ensure that the IP whitelist is properly configured and that only trusted IPs are allowed to access the web console.