9.8 / 10
CRITICAL
CRITICAL
A deserialization of untrusted data vulnernerability exists in rails < 5.2.4.3, rails < 6.0.3.1 that can allow an attacker to unmarshal user-provided objects in MemCacheStore and RedisCacheStore potentially resulting in an RCE.
Weakness: Deserialization of Untrusted Data
The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid.
Published: 2020-06-19
Vulnerable Products
Community Advisory
This section is open source, for any additional information that enhances or clarifies the official advisory above.
CVE-2020-8165 Exploits (9)
- masahiro331/CVE-2020-8165 ( 34)
- hybryx/CVE-2020-8165 ( 3)
- umiterkol/CVE-2020-8165--Auto-Shell ( 1)
- danielklim/cve-2020-8165-demo ( 1)
- progfay/CVE-2020-8165
- AssassinUKG/CVE-2020-8165
- macosta-42/CVE-2020-8165
- gonzoyumo/test-rails-cve-2020-8165
- taipansec/CVE-2020-8165
Bug Bounty
Ruby on Rails: Untrusted strings that are cache fetched with raw option are automatically marshal loaded
submitted by dylan-ts over 2 years ago
publicly disclosed 9 months ago
Official CVE References
View references (8)
- opensuse.org/opensuse-security-announce/2020-10/msg00031.html
- opensuse.org/opensuse-security-announce/2020-10/msg00034.html
- google.com/g/rubyonrails-security/c/bv6fW4S0Y1c
- hackerone.com/reports/413388
- debian.org/debian-lts-announce/2020/06/msg00022.html
- debian.org/debian-lts-announce/2020/07/msg00013.html
- rubyonrails.org/2020/5/18/Rails-5-2-4-3-and-6-0-3-1-have-been-released/
- debian.org/security/2020/dsa-4766