Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
v3.0.0 (2021-04-14)
Version 3.0 introduces Omniauth v2.0 which addresses CVE-2015-9284. Omniauth now defaults to only allow
POSTas the allowed request_phase method.Upgrading to omniauth-rails_csrf_protection v1.0.0
The mitigation to CVE-2015-9284 included using
omniauth-rails_csrf_protectionto provide CSRF protection.You will still need to install this gem, additionally update it to the latest 1.x.x version
BREAKING CHANGES
Now that OmniAuth now defaults to only POST as the allowed request_phase method, you will need to convert any login links to use form helpers with the POST method.
Allowing GET Requests
In the scenario you absolutely must use GET requests as an allowed request method for authentication, you can override the protection provided with the followign config override: