Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2011-3187

Опубликовано: 29 авг. 2011
Источник: debian
EPSS Низкий

Описание

The to_s method in actionpack/lib/action_dispatch/middleware/remote_ip.rb in Ruby on Rails 3.0.5 does not validate the X-Forwarded-For header in requests from IP addresses on a Class C network, which might allow remote attackers to inject arbitrary text into log files or bypass intended address parsing via a crafted header.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
railsunfixedpackage

Примечания

  • X-Forwarded-For header is user supplied (like User-Agent)

EPSS

Процентиль: 92%
0.09049
Низкий

Связанные уязвимости

ubuntu
больше 14 лет назад

The to_s method in actionpack/lib/action_dispatch/middleware/remote_ip.rb in Ruby on Rails 3.0.5 does not validate the X-Forwarded-For header in requests from IP addresses on a Class C network, which might allow remote attackers to inject arbitrary text into log files or bypass intended address parsing via a crafted header.

nvd
больше 14 лет назад

The to_s method in actionpack/lib/action_dispatch/middleware/remote_ip.rb in Ruby on Rails 3.0.5 does not validate the X-Forwarded-For header in requests from IP addresses on a Class C network, which might allow remote attackers to inject arbitrary text into log files or bypass intended address parsing via a crafted header.

github
больше 8 лет назад

actionpack Improper Input Validation vulnerability

EPSS

Процентиль: 92%
0.09049
Низкий