6.8
CVSSv2

CVE-2008-7248

Published: 16/12/2009 Updated: 13/02/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 685
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Ruby on Rails 2.1 prior to 2.1.3 and 2.2.x prior to 2.2.2 does not verify tokens for requests with certain content types, which allows remote malicious users to bypass cross-site request forgery (CSRF) protection for requests to applications that rely on this protection, as demonstrated using text/plain.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

rubyonrails rails 2.1.0

rubyonrails rails 2.1.1

rubyonrails rails 2.1.2

rubyonrails rails 2.2.0

rubyonrails rails 2.2.1

Vendor Advisories

Debian Bug report logs - #558685 rails: [CVE-2009-4214] Cross-site scripting (XSS) vulnerability in the strip_tags Package: rails; Maintainer for rails is Debian Ruby Extras Maintainers <pkg-ruby-extras-maintainers@listsaliothdebianorg>; Source for rails is src:rails (PTS, buildd, popcon) Reported by: Michael Gilbert < ...

Exploits

source: wwwsecurityfocuscom/bid/37322/info Ruby on Rails is prone to a cross-site request-forgery vulnerability Exploiting this issue may allow a remote attacker to perform certain administrative actions, gain unauthorized access to the affected application, or delete certain data Other attacks are also possible /** * Redmine <= ...