语言:
http://www.nessus.org/u?16d62ba2
http://www.nessus.org/u?42de9ca4
http://www.nessus.org/u?2da12a39
http://www.nessus.org/u?2fcd6bd9
http://www.nessus.org/u?5c9373e0
http://www.nessus.org/u?2dafa51e
严重性: High
ID: 88532
文件名: freebsd_pkg_bb0ef21d0e1b461bbc3d9cba39948888.nasl
版本: 2.14
类型: local
发布时间: 2016/2/3
最近更新时间: 2022/3/28
支持的传感器: Nessus
风险因素: Medium
分数: 5.1
风险因素: Medium
基本分数: 5
时间分数: 4.1
矢量: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N
风险因素: High
基本分数: 7.5
时间分数: 7
矢量: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
时间矢量: CVSS:3.0/E:F/RL:O/RC:C
CPE: p-cpe:/a:freebsd:freebsd:rubygem-actionpack, p-cpe:/a:freebsd:freebsd:rubygem-actionpack4, p-cpe:/a:freebsd:freebsd:rubygem-actionview, p-cpe:/a:freebsd:freebsd:rubygem-activemodel4, p-cpe:/a:freebsd:freebsd:rubygem-activerecord, p-cpe:/a:freebsd:freebsd:rubygem-activerecord4, p-cpe:/a:freebsd:freebsd:rubygem-rails, p-cpe:/a:freebsd:freebsd:rubygem-rails-html-sanitizer, p-cpe:/a:freebsd:freebsd:rubygem-rails4, cpe:/o:freebsd:freebsd
必需的 KB 项: Host/local_checks_enabled, Host/FreeBSD/release, Host/FreeBSD/pkg_info
可利用: true
易利用性: Exploits are available
补丁发布日期: 2016/2/2
漏洞发布日期: 2016/1/25
CISA 已知可遭利用的漏洞到期日期: 2022/4/15
Core Impact
Metasploit (Ruby on Rails Dynamic Render File Upload Remote Code Execution)
CVE: CVE-2015-7576, CVE-2015-7577, CVE-2015-7581, CVE-2016-0751, CVE-2016-0752, CVE-2016-0753