CVE-2019-11027

Ruby OpenID (aka ruby-openid) through 2.8.0 has a remotely exploitable flaw. This library is used by Rails web applications to integrate with OpenID Providers. Severity can range from medium to critical, depending on how a web application developer chose to employ the ruby-openid library. Developers who based their OpenID integration heavily on the "example app" provided by the project are at highest risk.
Configurations

Configuration 1 (hide)

cpe:2.3:a:openid:ruby-openid:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:20

Type Values Removed Values Added
References () https://github.com/openid/ruby-openid/issues/122 - () https://github.com/openid/ruby-openid/issues/122 -
References () https://lists.debian.org/debian-lts-announce/2019/10/msg00014.html - () https://lists.debian.org/debian-lts-announce/2019/10/msg00014.html -
References () https://marc.info/?l=openid-security&m=155154717027534&w=2 - Mailing List, Third Party Advisory () https://marc.info/?l=openid-security&m=155154717027534&w=2 - Mailing List, Third Party Advisory
References () https://security.gentoo.org/glsa/202003-09 - () https://security.gentoo.org/glsa/202003-09 -

Information

Published : 2019-06-10 19:29

Updated : 2024-11-21 04:20


NVD link : CVE-2019-11027

Mitre link : CVE-2019-11027

CVE.ORG link : CVE-2019-11027


JSON object : View

Products Affected

openid

  • ruby-openid