GHSA-8fqx-7pv4-3jwm

Suggest an improvement
Source
https://github.com/advisories/GHSA-8fqx-7pv4-3jwm
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2017/10/GHSA-8fqx-7pv4-3jwm/GHSA-8fqx-7pv4-3jwm.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-8fqx-7pv4-3jwm
Aliases
Published
2017-10-24T18:33:38Z
Modified
2024-12-07T05:40:24.463173Z
Summary
Improper Input Validation in actionpack
Details

Ruby on Rails 2.1 before 2.1.3 and 2.2.x before 2.2.2 does not verify tokens for requests with certain content types, which allows remote attackers to bypass cross-site request forgery (CSRF) protection for requests to applications that rely on this protection, as demonstrated using text/plain.

Database specific
{
    "nvd_published_at": "2009-12-16T01:30:00Z",
    "cwe_ids": [
        "CWE-20"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2020-06-16T21:25:28Z"
}
References

Affected packages

RubyGems / actionpack

Package

Name
actionpack
Purl
pkg:gem/actionpack

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.1.0
Fixed
2.1.3

Affected versions

2.*

2.1.0
2.1.1
2.1.2

RubyGems / actionpack

Package

Name
actionpack
Purl
pkg:gem/actionpack

Affected ranges

Type
ECOSYSTEM
Events
Introduced
2.2.0
Fixed
2.2.2