The Recurly Client Ruby Library before 2.0.13, 2.1.11, 2.2.5, 2.3.10, 2.4.11, 2.5.4, 2.6.3, 2.7.8, 2.8.2, 2.9.2, 2.10.4, 2.11.3 is vulnerable to a Server-Side Request Forgery vulnerability in the "Resource#find" method that could result in compromise of API keys or other critical resources.
References
Link | Resource |
---|---|
https://dev.recurly.com/page/ruby-updates | Vendor Advisory |
https://github.com/recurly/recurly-client-ruby/commit/1bb0284d6e668b8b3d31167790ed6db1f6ccc4be | Patch Third Party Advisory |
https://hackerone.com/reports/288635 | Permissions Required |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Configuration 7 (hide)
|
Configuration 8 (hide)
|
Configuration 9 (hide)
|
Configuration 10 (hide)
|
Configuration 11 (hide)
|
Configuration 12 (hide)
|
History
No history.
Information
Published : 2017-11-13 17:29
Updated : 2024-02-28 16:04
NVD link : CVE-2017-0905
Mitre link : CVE-2017-0905
CVE.ORG link : CVE-2017-0905
JSON object : View
Products Affected
recurly
- recurly_client_ruby
CWE
CWE-918
Server-Side Request Forgery (SSRF)