IP Whitelist Bypass in Web Console for Ruby on Rails
CVE-2015-3224

Currently unrated

Key Information:

Vendor
CVE Published:
26 July 2015

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC๐ŸŸฃ EPSS 85%

What is CVE-2015-3224?

The Web Console component in Ruby on Rails before version 2.1.3 fails to properly handle X-Forwarded-For headers, which leads to a situation where remote attackers can exploit this flaw to bypass the IP whitelisting security measures. By crafting specific requests, they can manipulate the client's IP address, potentially allowing unauthorized access to sensitive functionalities that rely on these protections.

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

EPSS Score

85% chance of being exploited in the next 30 days.

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2015-3224 : IP Whitelist Bypass in Web Console for Ruby on Rails