|
Message-ID: <52829913.5090506@redhat.com> Date: Tue, 12 Nov 2013 14:09:39 -0700 From: Kurt Seifried <kseifried@...hat.com> To: oss-security@...ts.openwall.com CC: Mark Dodwell <mark@...ynamic.co.uk> Subject: Re: CVE request: rubygem omniauth-facebook CSRF vurnerability -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On 11/12/2013 01:58 PM, Josef Šimánek wrote: > # RubyGem omniauth-facebook CSRF vulnerability > > There is a security vulnerability in the CSRF protection of > omniauth-facebook 1.4.1. > > Versions affected: 1.4.1 Not affected: <= 1.4.0 (*) Fixed > versions: >= 1.5.0 > > (*) Versions <= 1.4.0 did not have any CSRF protection. So, while > this vulnerability does not directly affect versions <= 1.4.0, > downgrading to <= 1.4.0 is not a fix. > > ## Impact > > Because of the way that omniauth-facebook supports setting a > per-request state parameter by storing it in the session, it is > possible to circumvent the automatic CSRF protection. Therefore > the CSRF added in 1.4.1 should be considered broken. > > If you are currently providing a custom state, you will need to > store and retrieve this yourself (for example, by using the session > store) to use 1.5.0. > > All users running an affected release should upgrade to 1.5.0. > > ## Releases > > The 1.5.0 releases is available at the normal locations. > > > ## Workarounds > > None. > > ## Credits > > Egor Homakov (@homakov) > > > regardsJosef Šimánek > Can you link to the vulnerable code or the code commit fixing this? thanks. - -- Kurt Seifried Red Hat Security Response Team (SRT) PGP: 0x5E267993 A90B F995 7350 148F 66BF 7554 160D 4553 5E26 7993 -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.15 (GNU/Linux) iQIcBAEBAgAGBQJSgpkSAAoJEBYNRVNeJnmTiJkP/jON6q5ZPsPNV+5Ib8yMIK+K cGGvskIE/2+LOS9ThwvqjMiAG/w+97Q9bqr0cHiSH0Tcehg6GWlCkggW3Jq72ZP1 P6ECUU62VuemtaYfsCjPLunQP9S0zZpS2bdOYFyl22pUSKncwPy4fiZZ8cpyGkfe 0qCJxf36mOJjQTRzJe+IAFCBzLshkHroK//fnT326Mv172hEr/z40JoQKw/df0+b DL4XDjbkxLcCXJH8pNelU/qbBwpLBlHgT9/noFX7Ic9oIkoZDKDTBhJ8QhXHAarO 5DJWgRdEw9tvdf3XsRjbVFsT2UKcCufvnKXUmwbFslTpVWrLRUYnI18Q4Sh3xzGw gme/u0fecRQKW1nR8j+m1BS8a9rzAX267RmQJCqQsoQTOGf0c53dTZuBBTup/b3W 1aMjxbovvhXSomQID/GNvTTL8BeiJk6nOhddHYRe+zyLWI7+mOqkQKZRRGn/xTH6 LFjdsPNYoRfCwqt8GEuHpUeBTGe+tztNxa6AePXbtN6ucW4ADBdPHswXE5b7JWsI amCOAh5+EUpN1YVcolW2KESEW8lW8XC6zHJIqF53oBUf77gzmIcLyfq5KQG/fFxM Jque0YAq2xfkx0hQBg/m6f6oi/5AGKdgTLTRi3NvRx079N+/veS4JnLzcX8lwSKB AzvOWhoza+2y7iPRyULE =ZZJQ -----END PGP SIGNATURE-----
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.