Description
The request phase of the OmniAuth Ruby gem (1.9.1 and earlier) is vulnerable to Cross-Site Request Forgery when used as part of the Ruby on Rails framework, allowing accounts to be connected without user intent, user interaction, or feedback to the user. This permits a secondary account to be able to sign into the web application as the primary account.
Published: 2019-04-26
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-ww4x-rwq6-qpgf OmniAuth Ruby gem Cross-site Request Forgery in request phase
History

No history.

Subscriptions

Omniauth Omniauth
cve-icon MITRE

Status: PUBLISHED

Assigner: hackerone

Published:

Updated: 2024-08-06T08:43:42.338Z

Reserved: 2019-04-09T00:00:00.000Z

Link: CVE-2015-9284

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-04-26T15:29:00.267

Modified: 2024-11-21T02:40:14.993

Link: CVE-2015-9284

cve-icon Redhat

Severity : Important

Publid Date: 2015-05-27T00:00:00Z

Links: CVE-2015-9284 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses