Sha256: 09322477c71f15ab6ddf9d70468c150548bc3a6cec098e194ff224d00a4a746a

Contents?: true

Size: 981 Bytes

Versions: 1

Compression:

Stored size: 981 Bytes

Contents

---
gem: actionpack
framework: rails
cve: 2020-8166
date: 2020-05-18
url: https://groups.google.com/forum/#!topic/rubyonrails-security/NOjKiGeXUgw
title: Ability to forge per-form CSRF tokens given a global CSRF token
description: |
  It is possible to possible to, given a global CSRF token such as the one
  present in the authenticity_token meta tag, forge a per-form CSRF token for
  any action for that session.

  Versions Affected:  rails < 5.2.5, rails < 6.0.4
  Not affected:       Applications without existing HTML injection vulnerabilities.
  Fixed Versions:     rails >= 5.2.4.3, rails >= 6.0.3.1

  Impact
  ------

  Given the ability to extract the global CSRF token, an attacker would be able to
  construct a per-form CSRF token for that session.

  Workarounds
  -----------

  This is a low-severity security issue. As such, no workaround is necessarily
  until such time as the application can be upgraded.

patched_versions:
  - "~> 5.2.4.3"
  - ">= 6.0.3.1"

Version data entries

1 entries across 1 versions & 1 rubygems

Version Path
bundler-audit-0.7.0.1 data/ruby-advisory-db/gems/actionpack/CVE-2020-8166.yml