You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Ruby on Rails 2.1.x, 2.2.x, and 2.3.x before 2.3.11, and 3.x before 3.0.4, does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged (1) AJAX or (2) API requests that leverage "combinations of browser plugins and HTTP redirects," a related issue to CVE-2011-0696.
CVE-2011-0447 - Medium Severity Vulnerability
path: /tmp/git/sample_app/Gemfile.lock
Library home page: http://rubygems.org/gems/rails-3.0.1.gem
Dependency Hierarchy:
Ruby on Rails 2.1.x, 2.2.x, and 2.3.x before 2.3.11, and 3.x before 3.0.4, does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged (1) AJAX or (2) API requests that leverage "combinations of browser plugins and HTTP redirects," a related issue to CVE-2011-0696.
Publish Date: 2011-02-14
URL: CVE-2011-0447
Base Score Metrics not available
Type: Upgrade version
Origin: https://security.gentoo.org/glsa/201412-28
Release Date: 2014-12-14
Fix Resolution: All Ruby on Rails 2.x users should upgrade to the latest version >= rails-2.3.18
Step up your Open Source Security Game with WhiteSource here
The text was updated successfully, but these errors were encountered: