/
CVE-2008-7248.yml
37 lines (37 loc) · 1.71 KB
/
CVE-2008-7248.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
---
gem: actionpack
framework: rails
cve: 2008-7248
ghsa: 8fqx-7pv4-3jwm
url: https://weblog.rubyonrails.org/2008/11/18/potential-circumvention-of-csrf-protection-in-rails-2-1
title: Improper Input Validation in rails
date: 2017-10-24
description: |
Ruby on Rails 2.1 before 2.1.3 and 2.2.x before 2.2.2 does not verify
tokens for requests with certain content types, which allows remote
attackers to bypass cross-site request forgery (CSRF) protection
for requests to applications that rely on this protection, as
demonstrated using text/plain.
cvss_v2: 6.8
unaffected_versions:
- "< 2.1.0"
patched_versions:
- "~> 2.1.3"
- ">= 2.2.2"
related:
url:
- https://nvd.nist.gov/vuln/detail/CVE-2008-7248
- https://weblog.rubyonrails.org/2008/11/18/potential-circumvention-of-csrf-protection-in-rails-2-1
- https://groups.google.com/group/rubyonrails-security/browse_thread/thread/d741ee286e36e301?hl=en
- https://www.rorsecurity.info/journal/2008/11/19/circumvent-rails-csrf-protection.html
- https://github.com/advisories/GHSA-8fqx-7pv4-3jwm
- https://access.redhat.com/security/cve/CVE-2008-7248
- https://bugzilla.redhat.com/show_bug.cgi?id=544329
- https://pseudo-flaw.net/content/web-browsers/form-data-encoding-roundup/
- https://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html
- https://www.openwall.com/lists/oss-security/2009/11/28/1
- https://www.openwall.com/lists/oss-security/2009/12/02/2
- http://github.com/rails/rails/commit/099a98e9b7108dae3e0f78b207e0a7dc5913bd1a
- http://github.com/rails/rails/commit/f1ad8b48aae3ee26613b3e77bc0056e120096846
- https://rubygems.org/gems/rails/versions/2.1.2
- https://rubygems.org/gems/rails/versions/2.1.2