First published: Sat Aug 20 2011(Updated: )
A response splitting flaw in Ruby on Rails 2.3.x was reported [1] that could allow a remote attacker to inject arbitrary HTTP headers into a response due to insufficient sanitization of the values provided for response content types. This is corrected in upstream 2.3.13 (3.0.0 and later are not vulnerable). Patches are available in the advisory [1] and git [2]. [1] <a href="http://groups.google.com/group/rubyonrails-security/browse_thread/thread/6ffc93bde0298768">http://groups.google.com/group/rubyonrails-security/browse_thread/thread/6ffc93bde0298768</a> [2] <a href="https://github.com/rails/rails/commit/11dafeaa7533be26441a63618be93a03869c83a9">https://github.com/rails/rails/commit/11dafeaa7533be26441a63618be93a03869c83a9</a>
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/actionpack | >=2.3.0<2.3.13 | 2.3.13 |
redhat/rubygem-actionpack | <2.3.13 | 2.3.13 |
redhat/rubygem-actionpack | <3.0.0 | 3.0.0 |
Ruby on Rails | =2.3.2 | |
Ruby on Rails | =2.3.3 | |
Ruby on Rails | =2.3.4 | |
Ruby on Rails | =2.3.9 | |
Ruby on Rails | =2.3.10 | |
Ruby on Rails | =2.3.11 | |
Ruby on Rails | =2.3.12 |
http://groups.google.com/group/rubyonrails-security/msg/bbe342e43abaa78c?dmode=source&output=gplain
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3186 is classified as a medium severity vulnerability due to its potential for remote exploitation.
To fix CVE-2011-3186, upgrade Ruby on Rails to version 2.3.13 or later.
CVE-2011-3186 affects Ruby on Rails versions 2.3.0 through 2.3.12.
Yes, CVE-2011-3186 can be exploited remotely due to the response splitting flaw.
Applications using Ruby on Rails versions 2.3.x prior to 2.3.13 are vulnerable to CVE-2011-3186.