~ubuntu-security/ubuntu-cve-tracker/master

« back to all changes in this revision

Viewing changes to retired/CVE-2011-3187

  • Committer: Steve Beattie
  • Date: 2019-02-19 06:18:27 UTC
  • Revision ID: sbeattie@ubuntu.com-20190219061827-oh57fzcfc1u9dlfk
The ubuntu-cve-tracker project has been converted to git.

Please use 'git clone https://git.launchpad.net/ubuntu-cve-tracker' to
get the converted tree.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
Candidate: CVE-2011-3187
2
 
PublicDate: 2011-08-29
3
 
References: 
4
 
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3187
5
 
 http://www.openwall.com/lists/oss-security/2011/08/22/14
6
 
 http://webservsec.blogspot.com/2011/02/ruby-on-rails-vulnerability.html
7
 
Description:
8
 
 The to_s method in actionpack/lib/action_dispatch/middleware/remote_ip.rb
9
 
 in Ruby on Rails 3.0.5 does not validate the X-Forwarded-For header in
10
 
 requests from IP addresses on a Class C network, which might allow remote
11
 
 attackers to inject arbitrary text into log files or bypass intended
12
 
 address parsing via a crafted header.
13
 
Ubuntu-Description: 
14
 
Notes: 
15
 
 mdeslaur> looks like it's 3.x only
16
 
Bugs: 
17
 
 https://bugzilla.novell.com/show_bug.cgi?id=673010
18
 
Priority: low
19
 
Discovered-by:
20
 
Assigned-to: 
21
 
 
22
 
Patches_rails:
23
 
upstream_rails: needs-triage
24
 
hardy_rails: ignored (reached end-of-life)
25
 
lucid_rails: not-affected (2.2.3-2)
26
 
maverick_rails: not-affected (2.3.5-1.1)
27
 
natty_rails: not-affected (2.3.5-1.2ubuntu1)
28
 
devel_rails: not-affected (2.3.14.1)