The omniauth-facebook gem 1.4.1 before 1.5.0 does not properly store the session parameter, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks via the state parameter.
References
Configurations
History
21 Nov 2024, 01:55
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/ref/99/omniauth-facebook_gem.txt - | |
References | () http://seclists.org/oss-sec/2013/q4/264 - | |
References | () http://seclists.org/oss-sec/2013/q4/267 - | |
References | () http://www.osvdb.org/99693 - | |
References | () https://github.com/mkdynamic/omniauth-facebook/commit/ccfcc26fe7e34acbd75ad4a095fd01ce5ff48ee7 - Exploit, Patch | |
References | () https://groups.google.com/d/msg/ruby-security-ann/-tJHNlTiPh4/9SJxdEWLIawJ - |
Information
Published : 2014-05-13 15:55
Updated : 2024-11-21 01:55
NVD link : CVE-2013-4562
Mitre link : CVE-2013-4562
CVE.ORG link : CVE-2013-4562
JSON object : View
Products Affected
madeofcode
- omniauth-facebook
CWE
CWE-352
Cross-Site Request Forgery (CSRF)