Skip to content

Commit 3f72cb2

Browse files
GUIreedloden
authored andcommitted
Add CVE-2015-9284 for OmniAuth (#390)
1 parent d58a165 commit 3f72cb2

File tree

1 file changed

+25
-0
lines changed

1 file changed

+25
-0
lines changed

gems/omniauth/CVE-2015-9284.yml

Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
---
2+
gem: omniauth
3+
cve: 2015-9284
4+
url: https://github.com/omniauth/omniauth/pull/809
5+
title: CSRF vulnerability in OmniAuth's request phase
6+
date: 2015-05-25
7+
8+
description: |
9+
The request phase of the OmniAuth Ruby gem is vulnerable to Cross-Site
10+
Request Forgery (CSRF) when used as part of the Ruby on Rails framework, allowing
11+
accounts to be connected without user intent, user interaction, or feedback to
12+
the user. This permits a secondary account to be able to sign into the web
13+
application as the primary account.
14+
15+
In order to mitigate this vulnerability, Rails users should consider using the
16+
`omniauth-rails_csrf_protection` gem.
17+
18+
More info is available here: https://github.com/omniauth/omniauth/pull/809#issuecomment-502079405
19+
20+
cvss_v2: 6.8
21+
cvss_v3: 8.8
22+
23+
related:
24+
url:
25+
- https://github.com/cookpad/omniauth-rails_csrf_protection

0 commit comments

Comments
 (0)