CVE-2015-3224

medium

Description

request.rb in Web Console before 2.1.3, as used with Ruby on Rails 3.x and 4.x, does not properly restrict the use of X-Forwarded-For headers in determining a client's IP address, which allows remote attackers to bypass the whitelisted_ips protection mechanism via a crafted request.

References

https://groups.google.com/forum/message/raw?msg=rubyonrails-security/lzmz9_ijUFw/HBMPi4zp5NAJ

https://github.com/rails/web-console/blob/master/CHANGELOG.markdown

http://www.securityfocus.com/bid/75237

http://openwall.com/lists/oss-security/2015/06/16/18

http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160881.html

Details

Source: Mitre, NVD

Published: 2015-07-26

Updated: 2016-12-03

Risk Information

CVSS v2

Base Score: 4.3

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Severity: Medium

CVSS v3

Base Score: 4.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

Severity: Medium