Sha256: 5d634befc55f9e68a74707a18d0fa562cc400d9c82c272ed3f96e1e0732f13c8

Contents?: true

Size: 527 Bytes

Versions: 3

Compression:

Stored size: 527 Bytes

Contents

---
gem: omniauth
cve: 2017-18076
url: https://github.com/omniauth/omniauth/pull/867
title: omniauth leaks authenticity token in callback params
date: 2017-01-11

description: |
  In strategy.rb in OmniAuth before 1.3.2, the authenticity_token value is improperly protected because POST (in addition to GET) parameters are stored in the session and become available in the environment of the callback phase.

cvss_v2: 6.8

patched_versions:
  - ">= 1.3.2"

related:
  url:
    - https://nvd.nist.gov/vuln/detail/CVE-2017-18076

Version data entries

3 entries across 3 versions & 2 rubygems

Version Path
bundler-audit-0.7.0.1 data/ruby-advisory-db/gems/omniauth/CVE-2017-18076.yml
bundler-budit-0.6.2 data/ruby-advisory-db/gems/omniauth/CVE-2017-18076.yml
bundler-budit-0.6.1 data/ruby-advisory-db/gems/omniauth/CVE-2017-18076.yml