Vulnerability identifier: #VU28244
Vulnerability risk: Low
CVSSv3.1:
CVE-ID:
CWE-ID:
CWE-352
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
actionpack
Web applications /
Modules and components for CMS
Vendor: Ruby
Description
The vulnerability allows a remote attacker to perform cross-site request forgery attacks.
The vulnerability exists due to insufficient validation of the HTTP request origin in the "authenticity_token" meta tag. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
actionpack: 6.0.0 - 6.0.3 rc1, 5.2.0 - 5.2.4.2, 5.1.0 - 5.1.7 rc1, 5.0.0 - 5.0.7.2
CPE
External links
http://snyk.io/vuln/SNYK-RUBY-ACTIONPACK-569599
http://github.com/rails/rails/commit/d124f19287f4892c72ca54da728a781591c6fca1
http://groups.google.com/forum/#!topic/rubyonrails-security/NOjKiGeXUgw
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?