In strategy.rb in OmniAuth prior to 1.3.2, the authenticity_token value is improperly protected because POST (in addition to GET) parameters are stored in the session and become available in the environment of the callback phase.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
omniauth omniauth |
||
debian debian linux 9.0 |
||
debian debian linux 8.0 |