{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2016-2097","title":"Title"},{"category":"description","text":"Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.2 and 4.x before 4.1.14.2 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0752.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2016-2097","url":"https://www.suse.com/security/cve/CVE-2016-2097"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 963332 for CVE-2016-2097","url":"https://bugzilla.suse.com/963332"},{"category":"external","summary":"SUSE Bug 968850 for CVE-2016-2097","url":"https://bugzilla.suse.com/968850"},{"category":"external","summary":"Advisory link for SUSE-SU-2016:0854-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2016-March/001962.html"},{"category":"external","summary":"Advisory link for SUSE-SU-2016:0967-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2016-April/001988.html"},{"category":"external","summary":"Advisory link for SUSE-SU-2022:15116-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2022-December/013203.html"},{"category":"external","summary":"Advisory link for openSUSE-SU-2016:0835-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DD7VV27CT42C5NSNF7SS4TF46WAHCLKL/#DD7VV27CT42C5NSNF7SS4TF46WAHCLKL"}],"title":"SUSE CVE CVE-2016-2097","tracking":{"current_release_date":"2025-10-25T00:48:21Z","generator":{"date":"2023-02-15T05:06:45Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2016-2097","initial_release_date":"2023-02-15T05:06:45Z","revision_history":[{"date":"2023-02-15T05:06:45Z","number":"2","summary":"Current version"},{"date":"2023-12-08T04:37:53Z","number":"3","summary":"Current version"},{"date":"2023-12-09T03:14:17Z","number":"4","summary":"Current version"},{"date":"2025-01-01T10:07:58Z","number":"5","summary":"Current version"},{"date":"2025-02-18T15:47:37Z","number":"6","summary":"Current version"},{"date":"2025-03-16T04:12:32Z","number":"7","summary":"Current version"},{"date":"2025-04-25T09:45:19Z","number":"8","summary":"Current version"},{"date":"2025-08-02T23:28:57Z","number":"9","summary":"Current version"},{"date":"2025-10-25T00:48:21Z","number":"10","summary":"Current version"}],"status":"interim","version":"10"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"SUSE Lifecycle Management Server 1.3","product":{"name":"SUSE Lifecycle Management Server 1.3","product_id":"SUSE Lifecycle Management Server 1.3","product_identification_helper":{"cpe":"cpe:/a:suse:sle-slms:1.3"}}},{"category":"product_name","name":"SUSE Linux Enterprise Desktop 11 SP4","product":{"name":"SUSE Linux Enterprise Desktop 11 SP4","product_id":"SUSE Linux Enterprise Desktop 11 SP4","product_identification_helper":{"cpe":"cpe:/o:suse:suse_sled:11:sp4"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server 11 SP4","product":{"name":"SUSE Linux Enterprise Server 11 SP4","product_id":"SUSE Linux Enterprise Server 11 SP4","product_identification_helper":{"cpe":"cpe:/o:suse:suse_sles:11:sp4"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server for SAP Applications 11 SP4","product":{"name":"SUSE Linux Enterprise Server for SAP Applications 11 SP4","product_id":"SUSE Linux Enterprise Server for SAP Applications 11 SP4","product_identification_helper":{"cpe":"cpe:/o:suse:sles_sap:11:sp4"}}},{"category":"product_name","name":"SUSE Linux Enterprise Software Development Kit 11 SP4","product":{"name":"SUSE Linux Enterprise Software Development Kit 11 SP4","product_id":"SUSE Linux Enterprise Software Development Kit 11 SP4","product_identification_helper":{"cpe":"cpe:/a:suse:sle-sdk:11:sp4"}}},{"category":"product_name","name":"SUSE OpenStack Cloud 5","product":{"name":"SUSE OpenStack Cloud 5","product_id":"SUSE OpenStack Cloud 5","product_identification_helper":{"cpe":"cpe:/o:suse:cloud:5"}}},{"category":"product_name","name":"SUSE Studio Onsite 1.3","product":{"name":"SUSE Studio Onsite 1.3","product_id":"SUSE Studio Onsite 1.3","product_identification_helper":{"cpe":"cpe:/o:suse:sle-studioonsite:1.3"}}},{"category":"product_name","name":"SUSE WebYast 1.3","product":{"name":"SUSE WebYast 1.3","product_id":"SUSE WebYast 1.3","product_identification_helper":{"cpe":"cpe:/o:suse:webyast:1.3"}}},{"category":"product_version","name":"ruby2.1-rubygem-actionview-4_1-4.1.9-12.1","product":{"name":"ruby2.1-rubygem-actionview-4_1-4.1.9-12.1","product_id":"ruby2.1-rubygem-actionview-4_1-4.1.9-12.1","product_identification_helper":{"purl":"pkg:rpm/suse/ruby2.1-rubygem-actionview-4_1@4.1.9-12.1?upstream=rubygem-actionview-4_1-4.1.9-12.1.src.rpm"}}},{"category":"product_version","name":"rubygem-actionpack-3_2-3.2.12-0.26.1","product":{"name":"rubygem-actionpack-3_2-3.2.12-0.26.1","product_id":"rubygem-actionpack-3_2-3.2.12-0.26.1","product_identification_helper":{"purl":"pkg:rpm/suse/rubygem-actionpack-3_2@3.2.12-0.26.1?upstream=rubygem-actionpack-3_2-3.2.12-0.26.1.src.rpm"}}},{"category":"product_version","name":"rubygem-actionpack-3_2-3.2.12-0.27.3.1","product":{"name":"rubygem-actionpack-3_2-3.2.12-0.27.3.1","product_id":"rubygem-actionpack-3_2-3.2.12-0.27.3.1","product_identification_helper":{"purl":"pkg:rpm/suse/rubygem-actionpack-3_2@3.2.12-0.27.3.1?upstream=rubygem-actionpack-3_2-3.2.12-0.27.3.1.src.rpm"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"rubygem-actionpack-3_2-3.2.12-0.26.1 as component of SUSE Lifecycle Management Server 1.3","product_id":"SUSE Lifecycle Management Server 1.3:rubygem-actionpack-3_2-3.2.12-0.26.1"},"product_reference":"rubygem-actionpack-3_2-3.2.12-0.26.1","relates_to_product_reference":"SUSE Lifecycle Management Server 1.3"},{"category":"default_component_of","full_product_name":{"name":"rubygem-actionpack-3_2-3.2.12-0.26.1 as component of SUSE Linux Enterprise Server 11 SP4","product_id":"SUSE Linux Enterprise Server 11 SP4:rubygem-actionpack-3_2-3.2.12-0.26.1"},"product_reference":"rubygem-actionpack-3_2-3.2.12-0.26.1","relates_to_product_reference":"SUSE Linux Enterprise Server 11 SP4"},{"category":"default_component_of","full_product_name":{"name":"rubygem-actionpack-3_2-3.2.12-0.26.1 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP4","product_id":"SUSE Linux Enterprise Server for SAP Applications 11 SP4:rubygem-actionpack-3_2-3.2.12-0.26.1"},"product_reference":"rubygem-actionpack-3_2-3.2.12-0.26.1","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 11 SP4"},{"category":"default_component_of","full_product_name":{"name":"rubygem-actionpack-3_2-3.2.12-0.26.1 as component of SUSE Linux Enterprise Desktop 11 SP4","product_id":"SUSE Linux Enterprise Desktop 11 SP4:rubygem-actionpack-3_2-3.2.12-0.26.1"},"product_reference":"rubygem-actionpack-3_2-3.2.12-0.26.1","relates_to_product_reference":"SUSE Linux Enterprise Desktop 11 SP4"},{"category":"default_component_of","full_product_name":{"name":"rubygem-actionpack-3_2-3.2.12-0.26.1 as component of SUSE Linux Enterprise Software Development Kit 11 SP4","product_id":"SUSE Linux Enterprise Software Development Kit 11 SP4:rubygem-actionpack-3_2-3.2.12-0.26.1"},"product_reference":"rubygem-actionpack-3_2-3.2.12-0.26.1","relates_to_product_reference":"SUSE Linux Enterprise Software Development Kit 11 SP4"},{"category":"default_component_of","full_product_name":{"name":"ruby2.1-rubygem-actionview-4_1-4.1.9-12.1 as component of SUSE OpenStack Cloud 5","product_id":"SUSE OpenStack Cloud 5:ruby2.1-rubygem-actionview-4_1-4.1.9-12.1"},"product_reference":"ruby2.1-rubygem-actionview-4_1-4.1.9-12.1","relates_to_product_reference":"SUSE OpenStack Cloud 5"},{"category":"default_component_of","full_product_name":{"name":"rubygem-actionpack-3_2-3.2.12-0.26.1 as component of SUSE Studio Onsite 1.3","product_id":"SUSE Studio Onsite 1.3:rubygem-actionpack-3_2-3.2.12-0.26.1"},"product_reference":"rubygem-actionpack-3_2-3.2.12-0.26.1","relates_to_product_reference":"SUSE Studio Onsite 1.3"},{"category":"default_component_of","full_product_name":{"name":"rubygem-actionpack-3_2-3.2.12-0.27.3.1 as component of SUSE WebYast 1.3","product_id":"SUSE WebYast 1.3:rubygem-actionpack-3_2-3.2.12-0.27.3.1"},"product_reference":"rubygem-actionpack-3_2-3.2.12-0.27.3.1","relates_to_product_reference":"SUSE WebYast 1.3"},{"category":"default_component_of","full_product_name":{"name":"ruby2.1-rubygem-actionview-4_2 as component of SUSE Enterprise Storage 2.1","product_id":"SUSE Enterprise Storage 2.1:ruby2.1-rubygem-actionview-4_2"},"product_reference":"ruby2.1-rubygem-actionview-4_2","relates_to_product_reference":"SUSE Enterprise Storage 2.1"},{"category":"default_component_of","full_product_name":{"name":"rubygem-actionview-4_2 as component of SUSE Enterprise Storage 2.1","product_id":"SUSE Enterprise Storage 2.1:rubygem-actionview-4_2"},"product_reference":"rubygem-actionview-4_2","relates_to_product_reference":"SUSE Enterprise Storage 2.1"}]},"vulnerabilities":[{"cve":"CVE-2016-2097","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2016-2097"}],"notes":[{"category":"general","text":"Directory traversal vulnerability in Action View in Ruby on Rails before 3.2.22.2 and 4.x before 4.1.14.2 allows remote attackers to read arbitrary files by leveraging an application's unrestricted use of the render method and providing a .. (dot dot) in a pathname.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0752.","title":"CVE description"}],"product_status":{"recommended":["SUSE Lifecycle Management Server 1.3:rubygem-actionpack-3_2-3.2.12-0.26.1","SUSE Linux Enterprise Desktop 11 SP4:rubygem-actionpack-3_2-3.2.12-0.26.1","SUSE Linux Enterprise Server 11 SP4:rubygem-actionpack-3_2-3.2.12-0.26.1","SUSE Linux Enterprise Server for SAP Applications 11 SP4:rubygem-actionpack-3_2-3.2.12-0.26.1","SUSE Linux Enterprise Software Development Kit 11 SP4:rubygem-actionpack-3_2-3.2.12-0.26.1","SUSE OpenStack Cloud 5:ruby2.1-rubygem-actionview-4_1-4.1.9-12.1","SUSE Studio Onsite 1.3:rubygem-actionpack-3_2-3.2.12-0.26.1","SUSE WebYast 1.3:rubygem-actionpack-3_2-3.2.12-0.27.3.1"]},"references":[{"category":"external","summary":"CVE-2016-2097","url":"https://www.suse.com/security/cve/CVE-2016-2097"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 963332 for CVE-2016-2097","url":"https://bugzilla.suse.com/963332"},{"category":"external","summary":"SUSE Bug 968850 for CVE-2016-2097","url":"https://bugzilla.suse.com/968850"},{"category":"external","summary":"Advisory link for SUSE-SU-2016:0854-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2016-March/001962.html"},{"category":"external","summary":"Advisory link for SUSE-SU-2016:0967-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2016-April/001988.html"},{"category":"external","summary":"Advisory link for SUSE-SU-2022:15116-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2022-December/013203.html"},{"category":"external","summary":"Advisory link for openSUSE-SU-2016:0835-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/DD7VV27CT42C5NSNF7SS4TF46WAHCLKL/#DD7VV27CT42C5NSNF7SS4TF46WAHCLKL"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Lifecycle Management Server 1.3:rubygem-actionpack-3_2-3.2.12-0.26.1","SUSE Linux Enterprise Desktop 11 SP4:rubygem-actionpack-3_2-3.2.12-0.26.1","SUSE Linux Enterprise Server 11 SP4:rubygem-actionpack-3_2-3.2.12-0.26.1","SUSE Linux Enterprise Server for SAP Applications 11 SP4:rubygem-actionpack-3_2-3.2.12-0.26.1","SUSE Linux Enterprise Software Development Kit 11 SP4:rubygem-actionpack-3_2-3.2.12-0.26.1","SUSE OpenStack Cloud 5:ruby2.1-rubygem-actionview-4_1-4.1.9-12.1","SUSE Studio Onsite 1.3:rubygem-actionpack-3_2-3.2.12-0.26.1","SUSE WebYast 1.3:rubygem-actionpack-3_2-3.2.12-0.27.3.1"]},{"category":"no_fix_planned","details":"There is no fix planned for these products.\n","product_ids":["SUSE Enterprise Storage 2.1:ruby2.1-rubygem-actionview-4_2","SUSE Enterprise Storage 2.1:rubygem-actionview-4_2"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","version":"3.0"},"products":["SUSE Lifecycle Management Server 1.3:rubygem-actionpack-3_2-3.2.12-0.26.1","SUSE Linux Enterprise Desktop 11 SP4:rubygem-actionpack-3_2-3.2.12-0.26.1","SUSE Linux Enterprise Server 11 SP4:rubygem-actionpack-3_2-3.2.12-0.26.1","SUSE Linux Enterprise Server for SAP Applications 11 SP4:rubygem-actionpack-3_2-3.2.12-0.26.1","SUSE Linux Enterprise Software Development Kit 11 SP4:rubygem-actionpack-3_2-3.2.12-0.26.1","SUSE OpenStack Cloud 5:ruby2.1-rubygem-actionview-4_1-4.1.9-12.1","SUSE Studio Onsite 1.3:rubygem-actionpack-3_2-3.2.12-0.26.1","SUSE WebYast 1.3:rubygem-actionpack-3_2-3.2.12-0.27.3.1"]}],"threats":[{"category":"impact","date":"2016-02-29T21:15:29Z","details":"moderate"}],"title":"CVE-2016-2097"}]}