Sha256: a6bb6237f5ef9629c7b6334c507e60a3e1d8a08b74e2262ce0102b7e54b26b86

Contents?: true

Size: 1.22 KB

Versions: 1

Compression:

Stored size: 1.22 KB

Contents

---
gem: actionview
framework: rails
cve: 2020-8167
date: 2020-05-18
url: https://groups.google.com/forum/#!topic/rubyonrails-security/x9DixQDG9a0
title: CSRF Vulnerability in rails-ujs
description: |
  There is an vulnerability in rails-ujs that allows attackers to send
  CSRF tokens to wrong domains.

  Versions Affected:  rails <= 6.0.3
  Not affected:       Applications which don't use rails-ujs.
  Fixed Versions:     rails >= 5.2.4.3, rails >= 6.0.3.1

  Impact
  ------

  This is a regression of CVE-2015-1840.

  In the scenario where an attacker might be able to control the href attribute of an anchor tag or
  the action attribute of a form tag that will trigger a POST action, the attacker can set the
  href or action to a cross-origin URL, and the CSRF token will be sent.

  Workarounds
  -----------

  To work around this problem, change code that allows users to control the href attribute of an anchor
  tag or the action attribute of a form tag to filter the user parameters.

  For example, code like this:

      link_to params

  to code like this:

      link_to filtered_params

      def filtered_params
        # Filter just the parameters that you trust
      end

patched_versions:
  - "~> 5.2.4.3"
  - ">= 6.0.3.1"

Version data entries

1 entries across 1 versions & 1 rubygems

Version Path
bundler-audit-0.7.0.1 data/ruby-advisory-db/gems/actionview/CVE-2020-8167.yml