IP Whitelist Bypass in Web Console for Ruby on Rails
CVE-2015-3224
Currently unrated
Key Information:
- Vendor
Rubyonrails
- Status
- Vendor
- CVE Published:
- 26 July 2015
Badges
๐พ Exploit Exists๐ก Public PoC๐ฃ EPSS 85%
What is CVE-2015-3224?
The Web Console component in Ruby on Rails before version 2.1.3 fails to properly handle X-Forwarded-For headers, which leads to a situation where remote attackers can exploit this flaw to bypass the IP whitelisting security measures. By crafting specific requests, they can manipulate the client's IP address, potentially allowing unauthorized access to sensitive functionalities that rely on these protections.
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
EPSS Score
85% chance of being exploited in the next 30 days.
Timeline
- ๐ก
Public PoC available
- ๐พ
Exploit known to exist
Vulnerability published
Vulnerability Reserved
