7.5
CVSSv3

CVE-2017-18076

Published: 26/01/2018 Updated: 03/10/2019
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

In strategy.rb in OmniAuth prior to 1.3.2, the authenticity_token value is improperly protected because POST (in addition to GET) parameters are stored in the session and become available in the environment of the callback phase.

Vulnerable Product Search on Vulmon Subscribe to Product

omniauth omniauth

debian debian linux 9.0

debian debian linux 8.0

Vendor Advisories

Debian Bug report logs - #888523 ruby-omniauth: CVE-2017-18076: security issue in returning post parameters from session in callback phase Package: src:ruby-omniauth; Maintainer for src:ruby-omniauth is Debian Ruby Extras Maintainers <pkg-ruby-extras-maintainers@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso < ...
Lalith Rallabhandi discovered that OmniAuth, a Ruby library for implementing multi-provider authentication in web applications, mishandled and leaked sensitive information An attacker with access to the callback environment, such as in the case of a crafted web application, can request authentication services from this module and access to the CSR ...