[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2011-0447

Date: (C)2011-02-14   (M)2015-12-16
 
CVSS Score: 6.8Access Vector: NETWORK
Exploitability Subscore: 8.6Access Complexity: MEDIUM
Impact Subscore: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL











Ruby on Rails 2.1.x, 2.2.x, and 2.3.x before 2.3.11, and 3.x before 3.0.4, does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged (1) AJAX or (2) API requests that leverage "combinations of browser plugins and HTTP redirects," a related issue to CVE-2011-0696.

Reference:
SECTRACK-1025060
SECUNIA-43274
SECUNIA-43666
BID-46291
ADV-2011-0587
ADV-2011-0877
DSA-2247
FEDORA-2011-2133
FEDORA-2011-2138
FEDORA-2011-4358
http://groups.google.com/group/rubyonrails-security/msg/c22ea1668c0d181c?dmode=source&output=gplain
http://weblog.rubyonrails.org/2011/2/8/csrf-protection-bypass-in-ruby-on-rails

CPE    26
cpe:/a:rubyonrails:ruby_on_rails:2.1.1
cpe:/a:rubyonrails:ruby_on_rails:2.2.0
cpe:/a:rubyonrails:ruby_on_rails:2.1.2
cpe:/a:rubyonrails:ruby_on_rails:2.2.1
...
CWE    1
CWE-352
OVAL    12
oval:org.secpod.oval:def:103094
oval:org.secpod.oval:def:103070
oval:org.secpod.oval:def:102969
oval:org.secpod.oval:def:101258
...

© 2013 SecPod Technologies