Clockwork Web before 0.1.2, when Rails before 5.2 is used, allows CSRF.
The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor.
The product uses external input to dynamically construct an XQuery expression used to retrieve data from an XML database, but it does not neutralize or incorrectly neutralizes that input. This allows an attacker to control the structure of the query.
Link | Tags |
---|---|
https://github.com/ankane/clockwork_web/issues/4 | third party advisory issue tracking |
https://github.com/ankane/clockwork_web/compare/v0.1.1...v0.1.2 | third party advisory patch |
https://github.com/ankane/clockwork_web/commit/ec2896503ee231588547c2fad4cb93a94e78f857 | third party advisory patch |