First published: Mon Aug 29 2011(Updated: )
The `to_s` method in `actionpack/lib/action_dispatch/middleware/remote_ip.rb` in Ruby on Rails 3.0.5 does not validate the X-Forwarded-For header in requests from IP addresses on a Class C network, which might allow remote attackers to inject arbitrary text into log files or bypass intended address parsing via a crafted header.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
rubygems/actionpack | >=2.3.0<2.3.13 | 2.3.13 |
Ruby on Rails | =3.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3187 is considered a moderate severity vulnerability due to the potential for log injection and IP address bypass.
To fix CVE-2011-3187, upgrade Ruby on Rails to version 3.0.6 or later, or update actionpack to version 2.3.13.
CVE-2011-3187 can allow attackers to manipulate log files or spoof IP addresses, which may lead to security issues.
While CVE-2011-3187 primarily affects older versions of Ruby on Rails, any application using those versions should still be assessed for risk.
CVE-2011-3187 affects Ruby on Rails version 3.0.5 and earlier.