Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-ww4x-rwq6-qpgf

Опубликовано: 29 мая 2019
Источник: github
Github: Прошло ревью
CVSS3: 8.8

Описание

OmniAuth Ruby gem Cross-site Request Forgery in request phase

The request phase of the OmniAuth Ruby gem (1.9.2 and earlier) is vulnerable to Cross-Site Request Forgery when used as part of the Ruby on Rails framework, allowing accounts to be connected without user intent, user interaction, or feedback to the user. This permits a secondary account to be able to sign into the web application as the primary account.

As of v2 OmniAuth no longer has the vulnerable configuration by default, but it is still possible to configure OmniAuth in such a way that the web application becomes vulnerable to Cross-Site Request Forgery. There is a recommended remediation described here.

Пакеты

Наименование

omniauth

rubygems
Затронутые версииВерсия исправления

<= 1.9.2

2.0.0

EPSS

Процентиль: 63%
0.0045
Низкий

8.8 High

CVSS3

Дефекты

CWE-352

Связанные уязвимости

CVSS3: 8.8
ubuntu
почти 7 лет назад

The request phase of the OmniAuth Ruby gem (1.9.1 and earlier) is vulnerable to Cross-Site Request Forgery when used as part of the Ruby on Rails framework, allowing accounts to be connected without user intent, user interaction, or feedback to the user. This permits a secondary account to be able to sign into the web application as the primary account.

CVSS3: 8.1
redhat
больше 10 лет назад

The request phase of the OmniAuth Ruby gem (1.9.1 and earlier) is vulnerable to Cross-Site Request Forgery when used as part of the Ruby on Rails framework, allowing accounts to be connected without user intent, user interaction, or feedback to the user. This permits a secondary account to be able to sign into the web application as the primary account.

CVSS3: 8.8
nvd
почти 7 лет назад

The request phase of the OmniAuth Ruby gem (1.9.1 and earlier) is vulnerable to Cross-Site Request Forgery when used as part of the Ruby on Rails framework, allowing accounts to be connected without user intent, user interaction, or feedback to the user. This permits a secondary account to be able to sign into the web application as the primary account.

CVSS3: 8.8
debian
почти 7 лет назад

The request phase of the OmniAuth Ruby gem (1.9.1 and earlier) is vuln ...

EPSS

Процентиль: 63%
0.0045
Низкий

8.8 High

CVSS3

Дефекты

CWE-352