Cross-site Request Forgery (CSRF) Affecting actionpack package, versions >= 3.0.0, <= 3.0.3>= 2.1.0, <= 2.3.10


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.38% (74th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Request Forgery (CSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUBY-ACTIONPACK-20275
  • published28 Feb 2017
  • disclosed8 Feb 2011
  • creditFelix Gröbert

Introduced: 8 Feb 2011

CVE-2011-0447  (opens in a new tab)
CWE-352  (opens in a new tab)

Overview

actionpack is a web app builder and tester on Rails. Affected versions of this package are vulnerable to Cross-site Request Forgery (CSRF) attacks.

Details

HTTP requests are not properly validated, and will allow requests containing an X-Requested-With header to be manipulated by an attacker. By spoofing AJAX requests and API requests that leverage a combination of browser plugins and HTTP redirects, an attacker may bypass the built in CSRF protection and successfully attack an application.

CVSS Scores

version 3.1