Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2016-2098 PoC — Ruby on Rails Action Pack 安全漏洞

Source
Associated Vulnerability
Title:Ruby on Rails Action Pack 安全漏洞 (CVE-2016-2098)
Description:Ruby on Rails(Rails)是Rails核心团队开发维护的一套基于Ruby语言的开源Web应用框架,它是由大卫-海纳梅尔-韩森从美国37signals公司的项目管理工具Basecamp里分离出来的。Action Pack是其中的一个用于构建和测试MVC Web应用程序的组件。 Ruby on Rails的Action Pack中存在安全漏洞,该漏洞源于‘render’函数没有充分过滤用户提交的输入。远程攻击者可通过向应用程序发送特制的数据利用该漏洞执行任意Ruby代码。以下版本受到影响:Rub
Description
Script that exploits the vulnerability that allows remote code execution in Ruby 2.3.8 ​​with CVE-2016-2098
Readme
# Ruby-on-Rails-ActionPack-Inline-ERB-Remote-Code-Execution
Script that exploits the vulnerability that allows remote code execution in Ruby 2.3.8 ​​with CVE-2016-2098
# Usage
./Ruby_On_Rails_ActionPack_Inline_ERB-Remote_Code_Execution.py [-h] --target-host TARGET_HOST --port PORT [--target-uri TARGET_URI] [--target-param TARGET_PARAM] --payload PAYLOAD
File Snapshot

[4.0K] /data/pocs/c4d38c68edebcec2b63b54e45d43d3505f79fd1d ├── [ 34K] LICENSE ├── [ 360] README.md └── [2.5K] Ruby_On_Rails_ActionPack_Inline_ERB-Remote_Code_Execution.py 0 directories, 3 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.