POC详情: f2e8e4b3bcb04e5fc8e3e298b68e5cfa5c057242

来源
关联漏洞
标题: Ruby on Rails 输入验证错误漏洞 (CVE-2013-0156)
描述:Ruby on Rails是美国Rails团队的一套基于Ruby语言的开源Web应用框架。 Ruby on Rails存在输入验证错误漏洞,该漏洞源于没有正确限制字符串值的转换 ,允许远程攻击者进行注入并执行任意代码。
描述
Infoblox NetMRI virtual appliances before version 7.6.1 are vulnerable to remote code execution (RCE) due to the use of a hardcoded Ruby on Rails session cookie secret key. The Rails web component deserializes session cookies if the signing key is valid. Attackers with knowledge of this key can craft malicious session cookies that are deserialized by the application, leading to arbitrary code execution. This vulnerability is related to the known Ruby on Rails deserialization flaw (CVE-2013-0156). Infoblox did not assign a new CVE for this issue, as it is a result of the underlying Rails vulnerability.
文件快照

id: infoblox-netmri-rails-cookie-rce info: name: Infoblox NetMRI < 7.6.1 - Remote Code Execution ...
神龙机器人已为您缓存
备注
    1. 建议优先通过来源进行访问。
    2. 如果因为来源失效或无法访问,请发送邮箱到 f.jinxu#gmail.com 索取本地快照(把 # 换成 @)。
    3. 神龙已为您对POC代码进行快照,为了长期维护,请考虑为本地POC付费,感谢您的支持。