CRLF injection vulnerability in Ruby on Rails before 2.0.5 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL to the redirect_to function.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:53
Type | Values Removed | Values Added |
---|---|---|
References | () http://github.com/rails/rails/commit/7282ed863ca7e6f928bae9162c9a63a98775a19d - | |
References | () http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html - | |
References | () http://weblog.rubyonrails.org/2008/10/19/rails-2-0-5-redirect_to-and-offset-limit-sanitizing - Vendor Advisory | |
References | () http://weblog.rubyonrails.org/2008/10/19/response-splitting-risk - | |
References | () http://www.securityfocus.com/bid/32359 - Patch |
Information
Published : 2008-11-21 12:00
Updated : 2024-11-21 00:53
NVD link : CVE-2008-5189
Mitre link : CVE-2008-5189
CVE.ORG link : CVE-2008-5189
JSON object : View
Products Affected
rubyonrails
- ruby_on_rails
- rails
CWE
CWE-352
Cross-Site Request Forgery (CSRF)