First published: Mon Feb 14 2011(Updated: )
Ruby on Rails 2.1.x, 2.2.x, and 2.3.x before 2.3.11, and 3.x before 3.0.4, does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged (1) AJAX or (2) API requests that leverage "combinations of browser plugins and HTTP redirects," a related issue to CVE-2011-0696.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Rubyonrails Rails | =2.1.0 | |
Rubyonrails Rails | =2.1.1 | |
Rubyonrails Rails | =2.1.2 | |
Rubyonrails Rails | =2.2.0 | |
Rubyonrails Rails | =2.2.1 | |
Rubyonrails Rails | =2.2.2 | |
Rubyonrails Rails | =2.3.2 | |
Rubyonrails Rails | =2.3.3 | |
Rubyonrails Rails | =2.3.4 | |
Rubyonrails Rails | =2.3.9 | |
Rubyonrails Rails | =2.3.10 | |
Rubyonrails Rails | =3.0.0-beta | |
Rubyonrails Rails | =3.0.0-beta2 | |
Rubyonrails Rails | =3.0.0-beta3 | |
Rubyonrails Rails | =3.0.0-beta4 | |
Rubyonrails Rails | =3.0.0-rc | |
Rubyonrails Rails | =3.0.0-rc2 | |
Rubyonrails Rails | =3.0.1-pre | |
Rubyonrails Rails | =3.0.2-pre | |
Rubyonrails Rails | =3.0.0 | |
Rubyonrails Rails | =3.0.1 | |
Rubyonrails Rails | =3.0.2 | |
Rubyonrails Rails | =3.0.3 | |
Rubyonrails Rails | =3.0.4-rc1 | |
rubygems/actionpack | >=3.0.0<3.0.4 | 3.0.4 |
rubygems/actionpack | >=2.1.0<2.3.11 | 2.3.11 |
http://groups.google.com/group/rubyonrails-security/msg/c22ea1668c0d181c?dmode=source&output=gplain
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.