Ruby on Rails 2.1.x, 2.2.x, and 2.3.x before 2.3.11, and 3.x before 3.0.4, does not properly validate HTTP requests that contain an X-Requested-With header, which makes it easier for remote attackers to conduct cross-site request forgery (CSRF) attacks via forged (1) AJAX or (2) API requests that leverage "combinations of browser plugins and HTTP redirects," a related issue to CVE-2011-0696.
2011-02-14T21:00:03.087
2025-04-11T00:51:21.963
Deferred
CVSSv2: 6.8 (MEDIUM)
AV:N/AC:M/Au:N/C:P/I:P/A:P
8.6
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | rubyonrails | rails | 2.1.0 | Yes |
Application | rubyonrails | rails | 2.1.1 | Yes |
Application | rubyonrails | rails | 2.1.2 | Yes |
Application | rubyonrails | rails | 2.2.0 | Yes |
Application | rubyonrails | rails | 2.2.1 | Yes |
Application | rubyonrails | rails | 2.2.2 | Yes |
Application | rubyonrails | rails | 2.3.2 | Yes |
Application | rubyonrails | rails | 2.3.3 | Yes |
Application | rubyonrails | rails | 2.3.4 | Yes |
Application | rubyonrails | rails | 2.3.9 | Yes |
Application | rubyonrails | rails | 2.3.10 | Yes |
Application | rubyonrails | rails | 3.0.0 | Yes |
Application | rubyonrails | rails | 3.0.0 | Yes |
Application | rubyonrails | rails | 3.0.0 | Yes |
Application | rubyonrails | rails | 3.0.0 | Yes |
Application | rubyonrails | rails | 3.0.0 | Yes |
Application | rubyonrails | rails | 3.0.0 | Yes |
Application | rubyonrails | rails | 3.0.0 | Yes |
Application | rubyonrails | rails | 3.0.1 | Yes |
Application | rubyonrails | rails | 3.0.1 | Yes |
Application | rubyonrails | rails | 3.0.2 | Yes |
Application | rubyonrails | rails | 3.0.2 | Yes |
Application | rubyonrails | rails | 3.0.3 | Yes |
Application | rubyonrails | rails | 3.0.4 | Yes |