Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-18076

Опубликовано: 26 янв. 2018
Источник: debian

Описание

In strategy.rb in OmniAuth before 1.3.2, the authenticity_token value is improperly protected because POST (in addition to GET) parameters are stored in the session and become available in the environment of the callback phase.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
ruby-omniauthfixed1.6.1-1experimentalpackage
ruby-omniauthfixed1.3.1-2package

Примечания

  • https://github.com/omniauth/omniauth/pull/867

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 8 лет назад

In strategy.rb in OmniAuth before 1.3.2, the authenticity_token value is improperly protected because POST (in addition to GET) parameters are stored in the session and become available in the environment of the callback phase.

CVSS3: 7.5
nvd
около 8 лет назад

In strategy.rb in OmniAuth before 1.3.2, the authenticity_token value is improperly protected because POST (in addition to GET) parameters are stored in the session and become available in the environment of the callback phase.

CVSS3: 7.5
github
около 8 лет назад

Omniauth allows POST parameters to be stored in session