6.8
CVSSv2

CVE-2011-0447

Published: 14/02/2011 Updated: 08/08/2019
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Ruby on Rails 2.1.x, 2.2.x, and 2.3.x prior to 2.3.11, and 3.x prior to 3.0.4, does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote malicious users to conduct cross-site request forgery (CSRF) attacks via forged (1) AJAX or (2) API requests that leverage "combinations of browser plugins and HTTP redirects," a related issue to CVE-2011-0696.

Vulnerable Product Search on Vulmon Subscribe to Product

rubyonrails rails 2.1.2

rubyonrails rails 2.2.1

rubyonrails rails 2.3.9

rubyonrails rails 3.0.0

rubyonrails rails 3.0.1

rubyonrails rails 3.0.2

rubyonrails rails 2.1.0

rubyonrails rails 2.2.2

rubyonrails rails 2.3.2

rubyonrails rails 2.3.3

rubyonrails rails 2.3.4

rubyonrails rails 3.0.3

rubyonrails rails 3.0.4

rubyonrails rails 2.1.1

rubyonrails rails 2.2.0

rubyonrails rails 2.3.10

Vendor Advisories

Debian Bug report logs - #614864 CVE-2011-0446 and CVE-2011-0447 Package: rails; Maintainer for rails is Debian Ruby Extras Maintainers <pkg-ruby-extras-maintainers@listsaliothdebianorg>; Source for rails is src:rails (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Wed, 23 Feb 2011 21: ...
Several vulnerabilities have been discovered in Rails, the Ruby web application framework The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2011-0446 Multiple cross-site scripting (XSS) vulnerabilities when JavaScript encoding is used, allow remote attackers to inject arbitrary web script or HTML ...