Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2011-0447


Ruby on Rails 2.1.x, 2.2.x, and 2.3.x before 2.3.11, and 3.x before 3.0.4, does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged (1) AJAX or (2) API requests that leverage "combinations of browser plugins and HTTP redirects," a related issue to CVE-2011-0696.


Published

2011-02-14T21:00:03.087

Last Modified

2025-04-11T00:51:21.963

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 6.8 (MEDIUM)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

8.6

Impact Score

6.4

Weaknesses
  • Type: Primary
    CWE-352

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application rubyonrails rails 2.1.0 Yes
Application rubyonrails rails 2.1.1 Yes
Application rubyonrails rails 2.1.2 Yes
Application rubyonrails rails 2.2.0 Yes
Application rubyonrails rails 2.2.1 Yes
Application rubyonrails rails 2.2.2 Yes
Application rubyonrails rails 2.3.2 Yes
Application rubyonrails rails 2.3.3 Yes
Application rubyonrails rails 2.3.4 Yes
Application rubyonrails rails 2.3.9 Yes
Application rubyonrails rails 2.3.10 Yes
Application rubyonrails rails 3.0.0 Yes
Application rubyonrails rails 3.0.0 Yes
Application rubyonrails rails 3.0.0 Yes
Application rubyonrails rails 3.0.0 Yes
Application rubyonrails rails 3.0.0 Yes
Application rubyonrails rails 3.0.0 Yes
Application rubyonrails rails 3.0.0 Yes
Application rubyonrails rails 3.0.1 Yes
Application rubyonrails rails 3.0.1 Yes
Application rubyonrails rails 3.0.2 Yes
Application rubyonrails rails 3.0.2 Yes
Application rubyonrails rails 3.0.3 Yes
Application rubyonrails rails 3.0.4 Yes

References