Description
Ruby on Rails web applications that pass unverified user input to the render method in a controller or a view may be vulnerable to a code injection.
Remediation
All users running an affected release should either upgrade or use one of the workarounds immediately. A workaround to this issue is to not pass arbitrary user input to the render method. Instead, verify that data before passing it to the render method. Consult Web references for more information about this issue.
References
Related Vulnerabilities
IBM ODM JNDI injection (CVE-2024-22319)
Apache Struts2 remote code execution vulnerability
XWiki Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2023-26477)
WordPress Plugin wp heyloyalty Remote Code Execution (1.1.4)
XWiki Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2023-50721)