Hacker Newsnew | past | comments | ask | show | jobs | submitlogin
Metasploit Rails 2.x, 3.x Remote Code Execution module released (github.com/rapid7)
4 points by FiloSottile on Jan 10, 2013 | hide | past | favorite | 1 comment


Basically, instant shell access to all unpached RoR 2.x and 3.x, for everyone.

    This module exploits a remote code execution vulnerability in the XML request
    processor of the Ruby on Rails application framework. This vulnerability allows
    an attacker to instantiate a remote object, which in turn can be used to execute
    any ruby code remotely in the context of the application.

    This module has been tested across multiple versions of RoR 3.x and RoR 2.x
From the update here https://community.rapid7.com/community/metasploit/blog/2013/... - https://news.ycombinator.com/item?id=5035023




Consider applying for YC's Winter 2026 batch! Applications are open till Nov 10

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: