#VU28244 Cross-site request forgery


Published: 2020-05-26 | Updated: 2020-07-15

Vulnerability identifier: #VU28244

Vulnerability risk: Low

CVSSv3.1:

CVE-ID: CVE-2020-8166

CWE-ID: CWE-352

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
actionpack
Web applications / Modules and components for CMS

Vendor: Ruby

Description

The vulnerability allows a remote attacker to perform cross-site request forgery attacks.

The vulnerability exists due to insufficient validation of the HTTP request origin in the "authenticity_token" meta tag. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

actionpack: 6.0.0 - 6.0.3 rc1, 5.2.0 - 5.2.4.2, 5.1.0 - 5.1.7 rc1, 5.0.0 - 5.0.7.2


CPE

External links
http://snyk.io/vuln/SNYK-RUBY-ACTIONPACK-569599
http://github.com/rails/rails/commit/d124f19287f4892c72ca54da728a781591c6fca1
http://groups.google.com/forum/#!topic/rubyonrails-security/NOjKiGeXUgw


Q & A

Can this vulnerability be exploited remotely?

Is there known malware, which exploits this vulnerability?


Latest bulletins with this vulnerability