Ruby on Rails 2.1 before 2.1.3 and 2.2.x before 2.2.2 does not verify tokens for requests with certain content types, which allows remote attackers to bypass cross-site request forgery (CSRF) protection for requests to applications that rely on this protection, as demonstrated using text/plain.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://groups.google.com/group/rubyonrails-security/browse_thread/thread/d741ee286e36e301?hl=en - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html - | |
References | () http://pseudo-flaw.net/content/web-browsers/form-data-encoding-roundup/ - | |
References | () http://secunia.com/advisories/36600 - Vendor Advisory | |
References | () http://secunia.com/advisories/38915 - | |
References | () http://weblog.rubyonrails.org/2008/11/18/potential-circumvention-of-csrf-protection-in-rails-2-1 - | |
References | () http://www.openwall.com/lists/oss-security/2009/11/28/1 - | |
References | () http://www.openwall.com/lists/oss-security/2009/12/02/2 - | |
References | () http://www.rorsecurity.info/journal/2008/11/19/circumvent-rails-csrf-protection.html - Exploit | |
References | () http://www.vupen.com/english/advisories/2009/2544 - Vendor Advisory |
Information
Published : 2009-12-16 01:30
Updated : 2024-11-21 00:58
NVD link : CVE-2008-7248
Mitre link : CVE-2008-7248
CVE.ORG link : CVE-2008-7248
JSON object : View
Products Affected
rubyonrails
- rails
CWE
CWE-20
Improper Input Validation