Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2011-0447 | First vendor Publication | 2011-02-14 |
Vendor | Cve | Last vendor Modification | 2024-11-21 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.8 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Ruby on Rails 2.1.x, 2.2.x, and 2.3.x before 2.3.11, and 3.x before 3.0.4, does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged (1) AJAX or (2) API requests that leverage "combinations of browser plugins and HTTP redirects," a related issue to CVE-2011-0696. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0447 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-352 | Cross-Site Request Forgery (CSRF) (CWE/SANS Top 25) |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:12893 | |||
Oval ID: | oval:org.mitre.oval:def:12893 | ||
Title: | DSA-2247-1 rails -- several vulnerabilities | ||
Description: | Several vulnerabilities have been discovered in Rails, the Ruby web application framework. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2011-0446 Multiple cross-site scripting vulnerabilities when JavaScript encoding is used, allow remote attackers to inject arbitrary web script or HTML. CVE-2011-0447 Rails does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery attacks. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-2247-1 CVE-2011-0446 CVE-2011-0447 | Version: | 5 |
Platform(s): | Debian GNU/Linux 5.0 Debian GNU/Linux 6.0 Debian GNU/kFreeBSD 6.0 | Product(s): | rails |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2011-09-12 | Name : Fedora Update for rubygem-actionpack FEDORA-2011-11567 File : nvt/gb_fedora_2011_11567_rubygem-actionpack_fc14.nasl |
2011-08-03 | Name : Debian Security Advisory DSA 2247-1 (rails) File : nvt/deb_2247_1.nasl |
2011-03-08 | Name : Fedora Update for rubygem-actionpack FEDORA-2011-2133 File : nvt/gb_fedora_2011_2133_rubygem-actionpack_fc14.nasl |
2011-03-08 | Name : Fedora Update for rubygem-actionpack FEDORA-2011-2138 File : nvt/gb_fedora_2011_2138_rubygem-actionpack_fc13.nasl |
2011-02-22 | Name : Mandriva Update for python-django MDVSA-2011:031 (python-django) File : nvt/gb_mandriva_MDVSA_2011_031.nasl |
2010-08-02 | Name : Ruby on Rails Cross Site Request Forgery Vulnerability File : nvt/secpod_ruby_rails_csrf_vuln.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
70927 | Ruby on Rails Ajax/API Request CSRF Protection Bypass Ruby on Rails contains a flaw that allows a remote Cross-site Request Forgery (CSRF / XSRF) attack. The flaw exists because the application does not require multiple steps or explicit confirmation for AJAX or API HTTP requests that contain a X-Requested-With header. This makes it easier for an attacker to use a crafted URL (e.g., a crafted GET request inside an "img" tag) to trick the victim into clicking on the image to take advantage of the trust relationship between the authenticated victim and the application. Such an attack could trick the victim into executing arbitrary commands in the context of their session with the application, without further prompting or verification. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2014-12-15 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201412-28.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_3_rubygem-actionmailer-111116.nasl - Type : ACT_GATHER_INFO |
2014-06-13 | Name : The remote openSUSE host is missing a security update. File : suse_11_4_rubygem-actionmailer-111116.nasl - Type : ACT_GATHER_INFO |
2011-06-10 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-2247.nasl - Type : ACT_GATHER_INFO |
2011-04-06 | Name : The remote Fedora host is missing one or more security updates. File : fedora_2011-4358.nasl - Type : ACT_GATHER_INFO |
2011-03-07 | Name : The remote Fedora host is missing a security update. File : fedora_2011-2133.nasl - Type : ACT_GATHER_INFO |
2011-03-07 | Name : The remote Fedora host is missing a security update. File : fedora_2011-2138.nasl - Type : ACT_GATHER_INFO |
2011-02-20 | Name : The remote Mandriva Linux host is missing a security update. File : mandriva_MDVSA-2011-031.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:06:05 |
|
2024-11-28 12:24:37 |
|
2024-08-02 12:15:44 |
|
2024-08-02 01:04:20 |
|
2024-02-02 01:15:16 |
|
2024-02-01 12:04:15 |
|
2023-09-05 12:14:17 |
|
2023-09-05 01:04:07 |
|
2023-09-02 12:14:20 |
|
2023-09-02 01:04:10 |
|
2023-08-12 12:17:14 |
|
2023-08-12 01:04:11 |
|
2023-08-11 12:14:25 |
|
2023-08-11 01:04:19 |
|
2023-08-06 12:13:51 |
|
2023-08-06 01:04:12 |
|
2023-08-04 12:13:56 |
|
2023-08-04 01:04:13 |
|
2023-07-14 12:13:54 |
|
2023-07-14 01:04:10 |
|
2023-03-29 01:15:50 |
|
2023-03-28 12:04:16 |
|
2022-10-11 12:12:24 |
|
2022-10-11 01:03:57 |
|
2021-05-04 12:13:54 |
|
2021-04-22 01:15:04 |
|
2020-05-23 00:27:40 |
|
2019-08-09 12:03:47 |
|
2019-08-08 21:19:39 |
|
2016-04-26 20:30:16 |
|
2014-12-16 13:24:46 |
|
2014-06-14 13:30:07 |
|
2014-02-17 11:00:02 |
|
2013-05-10 22:53:30 |
|