First published: Tue May 26 2020(Updated: )
A deserialization of untrusted data vulnerability exists in rails < 5.2.4.3, rails < 6.0.3.1 which can allow an attacker to supply information can be inadvertently leaked fromStrong Parameters.
Credit: support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/actionpack | >=6.0.0<=6.0.3 | 6.0.3.1 |
rubygems/actionpack | >=5.0.0<=5.2.4.2 | 5.2.4.3 |
Rubyonrails Rails | <5.2.4.3 | |
Rubyonrails Rails | >=6.0.0<6.0.3.1 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
openSUSE Backports SLE | =15.0-sp1 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 | |
debian/rails | 2:5.2.2.1+dfsg-1+deb10u3 2:5.2.2.1+dfsg-1+deb10u5 2:6.0.3.7+dfsg-2+deb11u2 2:6.1.7.3+dfsg-1 2:6.1.7.3+dfsg-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8164 is a deserialization of untrusted data vulnerability in Rails versions below 5.2.4.3 and below 6.0.3.1.
CVE-2020-8164 can lead to the inadvertent leakage of user-supplied information from Strong Parameters in Rails.
Rails versions below 5.2.4.3 and below 6.0.3.1 are affected by CVE-2020-8164.
To fix CVE-2020-8164, upgrade to Rails version 5.2.4.3 or higher for Rails 5.x and version 6.0.3.1 or higher for Rails 6.x.
More information about CVE-2020-8164 can be found at the following sources: [NVD](https://nvd.nist.gov/vuln/detail/CVE-2020-8164), [Ruby Advisory Database](https://github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2020-8164.yml), [Google Groups](https://groups.google.com/forum/#!topic/rubyonrails-security/f6ioe4sdpbY).