Sha256: c3ad986e96a987bde988e2037b0880e88762a8bbc74dda5b93d58cf8b0077ebd

Contents?: true

Size: 778 Bytes

Versions: 6

Compression:

Stored size: 778 Bytes

Contents

---
gem: web-console
cve: 2015-3224
url: https://groups.google.com/forum/#!topic/ruby-security-ann/lzmz9_ijUFw
title: |
  IP whitelist bypass in Web Console 
date: 2015-06-16

description: |
  Specially crafted remote requests can spoof their origin, bypassing the IP whitelist, in any environment where Web Console is enabled (development and test, by default). 

  Users whose application is only accessible from localhost (as is the default behaviour in Rails 4.2) are not affected, unless a local proxy is involved. 

  All affected users should either upgrade or use one of the work arounds immediately. 

  To work around this issue, turn off web-console in all environments, by removing/commenting it from the application's Gemfile. 

patched_versions:
  - ">= 2.1.3"



Version data entries

6 entries across 6 versions & 2 rubygems

Version Path
bundler-audit-0.7.0.1 data/ruby-advisory-db/gems/web-console/CVE-2015-3224.yml
bundler-budit-0.6.2 data/ruby-advisory-db/gems/web-console/CVE-2015-3224.yml
bundler-budit-0.6.1 data/ruby-advisory-db/gems/web-console/CVE-2015-3224.yml
bundler-audit-0.6.1 data/ruby-advisory-db/gems/web-console/CVE-2015-3224.yml
bundler-audit-0.6.0 data/ruby-advisory-db/gems/web-console/CVE-2015-3224.yml
bundler-audit-0.5.0 data/ruby-advisory-db/gems/web-console/CVE-2015-3224.yml