Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWNmMzYtOTg1Zy12NzNj
omniauth-facebook Cross-Site Request Forgery vulnerability
The omniauth-facebook gem 1.4.1 before 1.5.0 does not properly store the session parameter, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks via the state parameter.
Permalink: https://github.com/advisories/GHSA-cf36-985g-v73cJSON: https://advisories.ecosyste.ms/api/v1/advisories/MDE2OlNlY3VyaXR5QWR2aXNvcnlHSFNBLWNmMzYtOTg1Zy12NzNj
Source: GitHub Advisory Database
Origin: Unspecified
Severity: Moderate
Classification: General
Published: about 7 years ago
Updated: about 1 year ago
EPSS Percentage: 0.00765
EPSS Percentile: 0.81
Identifiers: GHSA-cf36-985g-v73c, CVE-2013-4562
References:
- https://nvd.nist.gov/vuln/detail/CVE-2013-4562
- https://github.com/mkdynamic/omniauth-facebook/commit/ccfcc26fe7e34acbd75ad4a095fd01ce5ff48ee7
- https://groups.google.com/d/msg/ruby-security-ann/-tJHNlTiPh4/9SJxdEWLIawJ
- http://seclists.org/oss-sec/2013/q4/264
- http://seclists.org/oss-sec/2013/q4/267
- https://github.com/advisories/GHSA-cf36-985g-v73c
Blast Radius: 0.0
Affected Packages
rubygems:omniauth-facebook
Dependent packages: 62Dependent repositories: 26,006
Downloads: 59,733,174 total
Affected Version Ranges: >= 1.4.1, < 1.5.0
Fixed in: 1.5.0
All affected versions: 1.4.1
All unaffected versions: 1.0.0, 1.1.0, 1.2.0, 1.3.0, 1.4.0, 1.5.0, 1.5.1, 1.6.0, 2.0.0, 2.0.1, 3.0.0, 4.0.0, 5.0.0, 6.0.0, 7.0.0, 8.0.0, 9.0.0, 10.0.0