vicvega / chaltron

Template generator for rails application with bootstrap, devise...
MIT License
9 stars 2 forks source link

CVE-2015-9284 (High) detected in omniauth-1.9.0.gem #27

Closed mend-bolt-for-github[bot] closed 4 years ago

mend-bolt-for-github[bot] commented 5 years ago

CVE-2015-9284 - High Severity Vulnerability

Vulnerable Library - omniauth-1.9.0.gem

A generalized Rack framework for multiple-provider authentication.

Library home page: https://rubygems.org/gems/omniauth-1.9.0.gem

Path to dependency file: /chaltron/Gemfile.lock

Path to vulnerable library: /var/lib/gems/2.3.0/cache/omniauth-1.9.0.gem

Dependency Hierarchy: - gitlab_omniauth-ldap-2.1.1.gem (Root Library) - :x: **omniauth-1.9.0.gem** (Vulnerable Library)

Found in HEAD commit: d21028cd02d14abca6761f653c04fc95bf92973c

Vulnerability Details

The request phase of the OmniAuth Ruby gem is vulnerable to Cross-Site Request Forgery when used as part of the Ruby on Rails framework, allowing accounts to be connected without user intent, user interaction, or feedback to the user. This permits a secondary account to be able to sign into the web application as the primary account.

Publish Date: 2019-04-26

URL: CVE-2015-9284

CVSS 3 Score Details (8.8)

Base Score Metrics: - Exploitability Metrics: - Attack Vector: Network - Attack Complexity: Low - Privileges Required: None - User Interaction: Required - Scope: Unchanged - Impact Metrics: - Confidentiality Impact: High - Integrity Impact: High - Availability Impact: High

For more information on CVSS3 Scores, click here.


Step up your Open Source Security Game with WhiteSource here