CVE-2011-0447Cross-Site Request Forgery in Rails

Severity
6.8MEDIUMNVD
EPSS
1.0%
top 23.08%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 14
Latest updateJul 23

Description

Ruby on Rails 2.1.x, 2.2.x, and 2.3.x before 2.3.11, and 3.x before 3.0.4, does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged (1) AJAX or (2) API requests that leverage "combinations of browser plugins and HTTP redirects," a related issue to CVE-2011-0696.

CVSS vector

AV:N/AC:M/C:P/I:P/A:PExploitability: 8.6 | Impact: 6.4

Affected Packages3 packages

Debianrubyonrails/rails< 2.3.11-0.1+3
NVDrubyonrails/rails16 versions+15
RubyGemsactionpack_project/actionpack2.1.02.3.11+1

Patches

🔴Vulnerability Details

5
GHSA
Cross-site request forgery in Django2018-07-23
GHSA
actionpack Cross-Site Request Forgery vulnerability2017-10-24
OSV
actionpack Cross-Site Request Forgery vulnerability2017-10-24
CVEList
CVE-2011-0447: Ruby on Rails 22011-02-14
OSV
CVE-2011-0447: Ruby on Rails 22011-02-14

📋Vendor Advisories

1
Debian
CVE-2011-0447: rails - Ruby on Rails 2.1.x, 2.2.x, and 2.3.x before 2.3.11, and 3.x before 3.0.4, does ...2011

💬Community

3
Bugzilla
CVE-2011-0447 rubygem-actionpack: CSRF flaws due improper validation of HTTP headers containing X-Requested-With header2011-02-15
Bugzilla
CVE-2011-0446 CVE-2011-0447 rubygem-actionpack various flaws [epel-5]2011-02-15
Bugzilla
CVE-2011-0446 CVE-2011-0447 rubygem-actionpack: various flaws [fedora-all]2011-02-15
CVE-2011-0447 — Cross-Site Request Forgery in Rails | cvebase