Vulnerability CVE-2013-4562


Published: 2014-05-13

Description:
The omniauth-facebook gem 1.4.1 before 1.5.0 does not properly store the session parameter, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks via the state parameter.

See advisories in our WLB2 database:
Topic
Author
Date
Low
RubyGem omniauth-facebook CSRF vulnerability
Egor Homakov
13.11.2013

Type:

CWE-352

(Cross-Site Request Forgery (CSRF))

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.8/10
6.4/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
Madeofcode -> Omniauth-facebook 

 References:
https://github.com/mkdynamic/omniauth-facebook/commit/ccfcc26fe7e34acbd75ad4a095fd01ce5ff48ee7
https://groups.google.com/d/msg/ruby-security-ann/-tJHNlTiPh4/9SJxdEWLIawJ
http://www.osvdb.org/99693
http://seclists.org/oss-sec/2013/q4/267
http://seclists.org/oss-sec/2013/q4/264
http://osvdb.org/ref/99/omniauth-facebook_gem.txt

Copyright 2024, cxsecurity.com

 

Back to Top