| Vulnerability Name: | CVE-2016-10522 (CCN-151771) | ||||||||||||||||||||||||||||||||
| Assigned: | 2016-12-25 | ||||||||||||||||||||||||||||||||
| Published: | 2016-12-25 | ||||||||||||||||||||||||||||||||
| Updated: | 2019-10-09 | ||||||||||||||||||||||||||||||||
| Summary: | rails_admin ruby gem <v1.1.1 is vulnerable to cross-site request forgery (CSRF) attacks. Non-GET methods were not validating CSRF tokens and, as a result, an attacker could hypothetically gain access to the application administrative endpoints exposed by the gem. | ||||||||||||||||||||||||||||||||
| CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
7.7 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||||||
| CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||||||||||||||||||||||||||
| Vulnerability Type: | CWE-352 | ||||||||||||||||||||||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||||||||||||||||||||||
| References: | Source: MITRE Type: CNA CVE-2016-10522 Source: XF Type: UNKNOWN railsadmin-cve201610522-csrf(151771) Source: CCN Type: rails_admin GIT Repository rails_admin ruby gem Source: CONFIRM Type: Patch, Third Party Advisory https://github.com/sferik/rails_admin/commit/b13e879eb93b661204e9fb5e55f7afa4f397537a Source: MISC Type: Exploit, Patch, Third Party Advisory https://www.sourceclear.com/blog/Rails_admin-Vulnerability-Disclosure/ Source: MISC Type: Exploit, Patch, Third Party Advisory https://www.sourceclear.com/registry/security/cross-site-request-forgery-csrf-/ruby/sid-3173 Source: CCN Type: Veracode Blog, December 25, 2016 Rails_admin Vulnerability Disclosure | ||||||||||||||||||||||||||||||||
| Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||||||||||||||||||||||||||
| Oval Definitions | |||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||
| BACK | |||||||||||||||||||||||||||||||||