Description
Ruby on Rails web applications that pass unverified user input to the render method in a controller or a view may be vulnerable to a code injection.
Remediation
All users running an affected release should either upgrade or use one of the workarounds immediately. A workaround to this issue is to not pass arbitrary user input to the render method. Instead, verify that data before passing it to the render method. Consult Web references for more information about this issue.
References
Related Vulnerabilities
WordPress Super Socialat backdoor plugin
Remote code execution of user-provided local names in Rails
WordPress Plugin PHP Everywhere Multiple Remote Code Execution Vulnerabilities (2.0.3)
WordPress Plugin Photo Gallery, Images, Slider in Rbs Image Gallery Remote Code Execution (2.0.14)
WordPress Plugin Kanzu Support Desk-WordPress Helpdesk Remote Code Execution (2.4.6)