Sha256: 7bcdca69c95751d3559adf0e265d6e201d3bb577a0769ad16c3bf0a2e28581ec

Contents?: true

Size: 859 Bytes

Versions: 1

Compression:

Stored size: 859 Bytes

Contents

---
gem: omniauth
cve: 2015-9284
url: https://github.com/omniauth/omniauth/pull/809
title: CSRF vulnerability in OmniAuth's request phase
date: 2015-05-25

description: |
  The request phase of the OmniAuth Ruby gem is vulnerable to Cross-Site
  Request Forgery (CSRF) when used as part of the Ruby on Rails framework, allowing
  accounts to be connected without user intent, user interaction, or feedback to
  the user. This permits a secondary account to be able to sign into the web
  application as the primary account.
  
  In order to mitigate this vulnerability, Rails users should consider using the
  `omniauth-rails_csrf_protection` gem.
  
  More info is available here: https://github.com/omniauth/omniauth/pull/809#issuecomment-502079405

cvss_v2: 6.8
cvss_v3: 8.8

related:
  url:
    - https://github.com/cookpad/omniauth-rails_csrf_protection

Version data entries

1 entries across 1 versions & 1 rubygems

Version Path
bundler-audit-0.7.0.1 data/ruby-advisory-db/gems/omniauth/CVE-2015-9284.yml