First published: Tue Nov 18 2008(Updated: )
A possibility to circumvent protection against cross-site request forgery (CSRF) attacks was found in Ruby on Rails. Quoting upstream security advisory for exact details: There is a bug in all 2.1.x versions of Ruby on Rails which affects the effectiveness of the CSRF protection given by protect_from_forgery. By design rails does not perform token verification on requests with certain content types not typically generated by browsers. Unfortunately this list also included ‘text/plain’ which can be generated by browsers. Requests can be crafted which will circumvent the CSRF protection entirely. Rails does not parse the parameters provided with these requests, but that may not be enough to protect your application. References: ----------- <a href="http://www.rorsecurity.info/journal/2008/11/19/circumvent-rails-csrf-protection.html">http://www.rorsecurity.info/journal/2008/11/19/circumvent-rails-csrf-protection.html</a> <a href="http://weblog.rubyonrails.org/2008/11/18/potential-circumvention-of-csrf-protection-in-rails-2-1">http://weblog.rubyonrails.org/2008/11/18/potential-circumvention-of-csrf-protection-in-rails-2-1</a> Upstream patch: --------------- <a href="http://github.com/rails/rails/commit/099a98e9b7108dae3e0f78b207e0a7dc5913bd1a">http://github.com/rails/rails/commit/099a98e9b7108dae3e0f78b207e0a7dc5913bd1a</a> CVE Request: ------------ <a href="http://www.openwall.com/lists/oss-security/2009/11/28/1">http://www.openwall.com/lists/oss-security/2009/11/28/1</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/actionpack | >=2.2.0<2.2.2 | 2.2.2 |
rubygems/actionpack | >=2.1.0<2.1.3 | 2.1.3 |
Ruby on Rails | =2.1.0 | |
Ruby on Rails | =2.1.1 | |
Ruby on Rails | =2.1.2 | |
Ruby on Rails | =2.2.0 | |
Ruby on Rails | =2.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-7248 is considered to be a medium severity vulnerability due to its potential to allow cross-site request forgery attacks.
To fix CVE-2008-7248, upgrade to Ruby on Rails versions 2.1.3 or 2.2.2 or higher.
Versions 2.1.0, 2.1.1, 2.1.2, 2.2.0, and 2.2.1 of Ruby on Rails are affected by CVE-2008-7248.
CVE-2008-7248 can potentially allow attackers to exploit cross-site request forgery (CSRF) vulnerabilities.
Yes, CVE-2008-7248 is specifically associated with the Ruby on Rails framework, particularly the actionpack package.