Vulnerability Description
The Safemode gem before 1.2.4 for Ruby, when initialized with a delegate object that is a Rails controller, allows context-dependent attackers to obtain sensitive information via the inspect method.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Safemode Project | Safemode | <= 1.2.3 |
Related Weaknesses (CWE)
References
- http://projects.theforeman.org/issues/14635
- http://rubysec.com/advisories/CVE-2016-3693/Vendor Advisory
- http://theforeman.org/security.html#2016-3693
- http://www.openwall.com/lists/oss-security/2016/04/20/8
- https://access.redhat.com/errata/RHSA-2018:0336
- https://github.com/svenfuchs/safemode/commit/0f764a1720a3a68fd2842e21377c8bfad6d
- https://github.com/theforeman/foreman/commit/82f9b93c54f72c5814df6bab7fad057eab6
- http://projects.theforeman.org/issues/14635
- http://rubysec.com/advisories/CVE-2016-3693/Vendor Advisory
- http://theforeman.org/security.html#2016-3693
- http://www.openwall.com/lists/oss-security/2016/04/20/8
- https://access.redhat.com/errata/RHSA-2018:0336
- https://github.com/svenfuchs/safemode/commit/0f764a1720a3a68fd2842e21377c8bfad6d
- https://github.com/theforeman/foreman/commit/82f9b93c54f72c5814df6bab7fad057eab6
FAQ
What is CVE-2016-3693?
CVE-2016-3693 is a vulnerability with a CVSS score of 8.1 (HIGH). The Safemode gem before 1.2.4 for Ruby, when initialized with a delegate object that is a Rails controller, allows context-dependent attackers to obtain sensitive information via the inspect method.
How severe is CVE-2016-3693?
CVE-2016-3693 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2016-3693?
Check the references section above for vendor advisories and patch information. Affected products include: Safemode Project Safemode.