Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-10522

Опубликовано: 05 июл. 2018
Источник: debian

Описание

rails_admin ruby gem <v1.1.1 is vulnerable to cross-site request forgery (CSRF) attacks. Non-GET methods were not validating CSRF tokens and, as a result, an attacker could hypothetically gain access to the application administrative endpoints exposed by the gem.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ruby-rails-adminremovedpackage
ruby-rails-adminno-dsastretchpackage

Примечания

  • https://github.com/sferik/rails_admin/commit/b13e879eb93b661204e9fb5e55f7afa4f397537a

  • Regression: https://github.com/sferik/rails_admin/issues/2830

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 7 лет назад

rails_admin ruby gem <v1.1.1 is vulnerable to cross-site request forgery (CSRF) attacks. Non-GET methods were not validating CSRF tokens and, as a result, an attacker could hypothetically gain access to the application administrative endpoints exposed by the gem.

CVSS3: 8.8
nvd
больше 7 лет назад

rails_admin ruby gem <v1.1.1 is vulnerable to cross-site request forgery (CSRF) attacks. Non-GET methods were not validating CSRF tokens and, as a result, an attacker could hypothetically gain access to the application administrative endpoints exposed by the gem.

CVSS3: 8.8
github
больше 7 лет назад

Cross-site request forgery in rails_admin