rails_admin ruby gem <v1.1.1 is vulnerable to cross-site request forgery (CSRF) attacks. Non-GET methods were not validating CSRF tokens and, as a result, an attacker could hypothetically gain access to the application administrative endpoints exposed by the gem.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
Link | Tags |
---|---|
https://www.sourceclear.com/blog/Rails_admin-Vulnerability-Disclosure/ | patch third party advisory exploit |
https://github.com/sferik/rails_admin/commit/b13e879eb93b661204e9fb5e55f7afa4f397537a | third party advisory patch |
https://www.sourceclear.com/registry/security/cross-site-request-forgery-csrf-/ruby/sid-3173 | patch third party advisory exploit |