CVE-2012-6134

Cross-site request forgery (CSRF) vulnerability in the omniauth-oauth2 gem 1.1.1 and earlier for Ruby allows remote attackers to hijack the authentication of users for requests that modify session state.
Configurations

Configuration 1 (hide)

cpe:2.3:a:omniauth-oauth2_project:omniauth-oauth2:*:*:*:*:*:ruby:*:*

History

21 Nov 2024, 01:45

Type Values Removed Values Added
References () http://rubysec.github.io/advisories/CVE-2012-6134/ - Broken Link () http://rubysec.github.io/advisories/CVE-2012-6134/ - Broken Link
References () http://seclists.org/oss-sec/2013/q1/304 - Mailing List, Third Party Advisory () http://seclists.org/oss-sec/2013/q1/304 - Mailing List, Third Party Advisory
References () https://gist.github.com/homakov/3673012 - Broken Link () https://gist.github.com/homakov/3673012 - Broken Link
References () https://github.com/Shopify/omniauth-shopify-oauth2/pull/1 - Patch, Third Party Advisory () https://github.com/Shopify/omniauth-shopify-oauth2/pull/1 - Patch, Third Party Advisory
References () https://github.com/intridea/omniauth-oauth2/pull/25 - Patch, Third Party Advisory () https://github.com/intridea/omniauth-oauth2/pull/25 - Patch, Third Party Advisory

Information

Published : 2013-04-09 20:55

Updated : 2024-11-21 01:45


NVD link : CVE-2012-6134

Mitre link : CVE-2012-6134

CVE.ORG link : CVE-2012-6134


JSON object : View

Products Affected

omniauth-oauth2_project

  • omniauth-oauth2
CWE
CWE-352

Cross-Site Request Forgery (CSRF)