The to_s method in actionpack/lib/action_dispatch/middleware/remote_ip.rb in Ruby on Rails 3.0.5 does not validate the X-Forwarded-For header in requests from IP addresses on a Class C network, which might allow remote attackers to inject arbitrary text into log files or bypass intended address parsing via a crafted header.
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
http://archives.neohapsis.com/archives/fulldisclosure/2011-02/0337.html | mailing list |
http://www.openwall.com/lists/oss-security/2011/08/17/1 | mailing list patch |
http://www.openwall.com/lists/oss-security/2011/08/22/13 | mailing list patch |
http://webservsec.blogspot.com/2011/02/ruby-on-rails-vulnerability.html | exploit |
http://www.openwall.com/lists/oss-security/2011/08/19/11 | mailing list patch |
http://www.openwall.com/lists/oss-security/2011/08/20/1 | mailing list patch |
http://www.openwall.com/lists/oss-security/2011/08/22/14 | mailing list exploit |
https://bugzilla.novell.com/show_bug.cgi?id=673010 | exploit |
http://www.openwall.com/lists/oss-security/2011/08/22/5 | mailing list patch |