Description
Ruby on Rails 2.1.x, 2.2.x, and 2.3.x before 2.3.11, and 3.x before 3.0.4, does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged (1) AJAX or (2) API requests that leverage "combinations of browser plugins and HTTP redirects," a related issue to CVE-2011-0696.
Published: 2011-02-14
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-2247-1 rails security update
EUVD EUVD EUVD-2017-0148 Ruby on Rails 2.1.x, 2.2.x, and 2.3.x before 2.3.11, and 3.x before 3.0.4, does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged (1) AJAX or (2) API requests that leverage "combinations of browser plugins and HTTP redirects," a related issue to CVE-2011-0696.
Github GHSA Github GHSA GHSA-24fg-p96v-hxh8 actionpack Cross-Site Request Forgery vulnerability
History

No history.

Subscriptions

Rubyonrails Rails
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-06T21:51:09.065Z

Reserved: 2011-01-13T00:00:00.000Z

Link: CVE-2011-0447

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2011-02-14T21:00:03.087

Modified: 2026-04-29T01:13:23.040

Link: CVE-2011-0447

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses