Vulnerability CVE-2015-3224


Published: 2015-07-26   Modified: 2015-07-27

Description:
request.rb in Web Console before 2.1.3, as used with Ruby on Rails 3.x and 4.x, does not properly restrict the use of X-Forwarded-For headers in determining a client's IP address, which allows remote attackers to bypass the whitelisted_ips protection mechanism via a crafted request.

See advisories in our WLB2 database:
Topic
Author
Date
High
Ruby on Rails 4.0.x / 4.1.x / 4.2.x Whitelist Bypass Code Execution
hdm
23.03.2017

CVSS2 => (AV:N/AC:M/Au:N/C:N/I:P/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
None
Affected software
Rubyonrails -> Web console 

 References:
http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160881.html
http://openwall.com/lists/oss-security/2015/06/16/18
http://www.securityfocus.com/bid/75237
https://github.com/rails/web-console/blob/master/CHANGELOG.markdown
https://groups.google.com/forum/message/raw?msg=rubyonrails-security/lzmz9_ijUFw/HBMPi4zp5NAJ

Copyright 2024, cxsecurity.com

 

Back to Top