This exercise covers how to get code execution by chaining vulnerabilities in a Ruby-on-Rails application