Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE-2020-36599 (Critical), CVE-2015-9284 (High) #178

Open
wimpog opened this issue May 13, 2024 · 1 comment
Open

CVE-2020-36599 (Critical), CVE-2015-9284 (High) #178

wimpog opened this issue May 13, 2024 · 1 comment

Comments

@wimpog
Copy link

wimpog commented May 13, 2024

CVE-2020-36599

CRITICAL Score 9.8
lib/omniauth/failure_endpoint.rb in OmniAuth before 1.9.2 (and before 2.0) does not escape the message_key value.

CVE-2015-9284

HIGH Score 8.8
The request phase of the OmniAuth Ruby gem (1.9.1 and earlier) is vulnerable to Cross-Site Request Forgery when used as part of the Ruby on Rails framework, allowing accounts to be connected without user intent, user interaction, or feedback to the user. This permits a secondary account to be able to sign into the web application as the primary account.

@BobbyMcWho
Copy link
Member

Update omniauth

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants