GHSA-3vfw-7rcp-3xgm

Suggest an improvement
Source
https://github.com/advisories/GHSA-3vfw-7rcp-3xgm
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2017/10/GHSA-3vfw-7rcp-3xgm/GHSA-3vfw-7rcp-3xgm.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-3vfw-7rcp-3xgm
Aliases
Published
2017-10-24T18:33:38Z
Modified
2024-11-29T05:35:28.609253Z
Summary
actionpack Improper Input Validation vulnerability
Details

The to_s method in actionpack/lib/action_dispatch/middleware/remote_ip.rb in Ruby on Rails 3.0.5 does not validate the X-Forwarded-For header in requests from IP addresses on a Class C network, which might allow remote attackers to inject arbitrary text into log files or bypass intended address parsing via a crafted header.

Database specific
{
    "nvd_published_at": "2011-08-29T18:55:01Z",
    "cwe_ids": [
        "CWE-20"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2020-06-16T20:56:30Z"
}
References

Affected packages

RubyGems / actionpack

Package

Name
actionpack
Purl
pkg:gem/actionpack

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.3.0
Fixed
2.3.13

Affected versions

2.*

2.3.2
2.3.3
2.3.4
2.3.5
2.3.6
2.3.7
2.3.8.pre1
2.3.8
2.3.9.pre
2.3.9
2.3.10
2.3.11
2.3.12