File tree Expand file tree Collapse file tree 1 file changed +25
-0
lines changed
Expand file tree Collapse file tree 1 file changed +25
-0
lines changed Original file line number Diff line number Diff line change 1+ ---
2+ gem : omniauth
3+ cve : 2015-9284
4+ url : https://github.com/omniauth/omniauth/pull/809
5+ title : CSRF vulnerability in OmniAuth's request phase
6+ date : 2015-05-25
7+
8+ description : |
9+ The request phase of the OmniAuth Ruby gem is vulnerable to Cross-Site
10+ Request Forgery (CSRF) when used as part of the Ruby on Rails framework, allowing
11+ accounts to be connected without user intent, user interaction, or feedback to
12+ the user. This permits a secondary account to be able to sign into the web
13+ application as the primary account.
14+
15+ In order to mitigate this vulnerability, Rails users should consider using the
16+ `omniauth-rails_csrf_protection` gem.
17+
18+ More info is available here: https://github.com/omniauth/omniauth/pull/809#issuecomment-502079405
19+
20+ cvss_v2 : 6.8
21+ cvss_v3 : 8.8
22+
23+ related :
24+ url :
25+ - https://github.com/cookpad/omniauth-rails_csrf_protection
You can’t perform that action at this time.
0 commit comments