Description
The request phase of the OmniAuth Ruby gem (1.9.1 and earlier) is vulnerable to Cross-Site Request Forgery when used as part of the Ruby on Rails framework, allowing accounts to be connected without user intent, user interaction, or feedback to the user. This permits a secondary account to be able to sign into the web application as the primary account.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-ww4x-rwq6-qpgf | OmniAuth Ruby gem Cross-site Request Forgery in request phase |
References
History
No history.
Status: PUBLISHED
Assigner: hackerone
Published:
Updated: 2024-08-06T08:43:42.338Z
Reserved: 2019-04-09T00:00:00.000Z
Link: CVE-2015-9284
No data.
Status : Modified
Published: 2019-04-26T15:29:00.267
Modified: 2024-11-21T02:40:14.993
Link: CVE-2015-9284
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA