Cross-site Request Forgery (CSRF) Affecting devise_invitable package, versions <1.3.5


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Request Forgery (CSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUBY-DEVISEINVITABLE-20356
  • published28 Mar 2017
  • disclosed9 Apr 2014
  • creditNicola Racco

Introduced: 9 Apr 2014

CVE NOT AVAILABLE CWE-352  (opens in a new tab)

How to fix?

Upgrade devise_invitable to version 1.3.5 or higher.

Overview

devise_invitable adds support for send invitations by email (it requires to be authenticated) and accept the invitation by setting a password.

Affected versions of the package are vulnerable to Cross-site Request Forgery (CSRF) attacks when the forgery protection strategy is set to :null_session or :reset_session. The value returned by the current_inviter function is memoized before the session is checked, so the session is cleaned but the current inviter remains memoized. Thus attackers can use the CSRF token to authenticate malicious requests.

CVSS Scores

version 3.1