First published: Tue May 26 2020(Updated: )
A deserialization of untrusted data vulnernerability exists in rails < 5.2.4.3, rails < 6.0.3.1 that can allow an attacker to unmarshal user-provided objects in MemCacheStore and RedisCacheStore potentially resulting in an RCE.
Credit: support@hackerone.com support@hackerone.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/activesupport | >=6.0.0<=6.0.3 | 6.0.3.1 |
rubygems/activesupport | >=5.0.0<=5.2.4.2 | 5.2.4.3 |
Rubyonrails Rails | <5.2.4.3 | |
Rubyonrails Rails | >=6.0.0<6.0.3.1 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
openSUSE Leap | =15.1 | |
openSUSE Leap | =15.2 | |
debian/rails | 2:5.2.2.1+dfsg-1+deb10u3 2:5.2.2.1+dfsg-1+deb10u5 2:6.0.3.7+dfsg-2+deb11u2 2:6.1.7.3+dfsg-1 2:6.1.7.3+dfsg-2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8165 is a deserialization of untrusted data vulnerability in Rails.
CVE-2020-8165 has a severity rating of 9.8 (critical).
Rails versions below 5.2.4.3 and below 6.0.3.1 are affected by CVE-2020-8165.
The vulnerability allows an attacker to execute arbitrary code by writing malicious data to the cache.
To fix CVE-2020-8165, upgrade Rails to version 5.2.4.3 or 6.0.3.1 or apply the recommended patches.