Incorrect Access Control Affecting simple_form package, versions <5.0.0


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.83% (74th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Incorrect Access Control vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUBY-SIMPLEFORM-469443
  • published30 Sept 2019
  • disclosed27 Sept 2019
  • creditUnknown

Introduced: 27 Sep 2019

CVE-2019-16676  (opens in a new tab)
CWE-284  (opens in a new tab)

How to fix?

Upgrade simple_form to version 5.0.0 or higher.

Overview

simple_form is a Forms made easy gem for Rails with simple DSL.

Affected versions of this package are vulnerable to Incorrect Access Control. For pages that build a form using user input, it is possible for an attacker to manipulate the input and send any method present in the form object. This is due to the file_method? in lib/simple_form/form_builder.rb treating a user-supplied string as a method call. The vulnerability is only applicable for pages that build forms based on user input.

PoC

<%= simple_form_for @user do |f| %>
  <%= f.label @user_supplied_string %>
  ...
<% end %>

CVSS Base Scores

version 3.1