GHSA-w3j4-76qw-wwjm

Source
https://github.com/advisories/GHSA-w3j4-76qw-wwjm
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/09/GHSA-w3j4-76qw-wwjm/GHSA-w3j4-76qw-wwjm.json
Aliases
Published
2021-09-07T23:08:24Z
Modified
2023-11-08T04:06:33.393719Z
Details

Impact

bettererrors prior to 2.8.0 did not implement CSRF protection for its internal requests. It also did not enforce the correct "Content-Type" header for these requests, which allowed a cross-origin "simple request" to be made without CORS protection. These together left an application with bettererrors enabled open to cross-origin attacks.

As a developer tool, bettererrors documentation strongly recommends addition only to the development bundle group, so this vulnerability should only affect development environments. Please ensure that your project limits bettererrors to the development group (or the non-Rails equivalent).

Patches

Starting with release 2.8.x, CSRF protection is enforced. It is recommended that you upgrade to the latest release, or minimally to "~> 2.8.3".

Workarounds

There are no known workarounds to mitigate the risk of using older releases of better_errors.

References

For more information

If you have any questions or comments about this advisory, please - Add to the discussion in bettererrors - Open an issue in bettererrors

References

Affected packages

RubyGems / better_errors

Package

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0The exact introduced commit is unknown
Fixed
2.8.0

Affected versions

0.*

0.0.1
0.0.2
0.0.3
0.0.4
0.0.5
0.0.6
0.0.7
0.0.8
0.1.0
0.1.1
0.2.0
0.3.0
0.3.2
0.5.0
0.6.0
0.7.0
0.7.2
0.8.0
0.9.0

1.*

1.0.0.rc1
1.0.0
1.0.1
1.1.0

2.*

2.0.0
2.1.0
2.1.1
2.2.0
2.3.0
2.4.0
2.5.0
2.5.1
2.6.0
2.7.0
2.7.1