1
Candidate: CVE-2011-3187
4
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3187
5
http://www.openwall.com/lists/oss-security/2011/08/22/14
6
http://webservsec.blogspot.com/2011/02/ruby-on-rails-vulnerability.html
8
The to_s method in actionpack/lib/action_dispatch/middleware/remote_ip.rb
9
in Ruby on Rails 3.0.5 does not validate the X-Forwarded-For header in
10
requests from IP addresses on a Class C network, which might allow remote
11
attackers to inject arbitrary text into log files or bypass intended
12
address parsing via a crafted header.
15
mdeslaur> looks like it's 3.x only
17
https://bugzilla.novell.com/show_bug.cgi?id=673010
23
upstream_rails: needs-triage
24
hardy_rails: ignored (reached end-of-life)
25
lucid_rails: not-affected (2.2.3-2)
26
maverick_rails: not-affected (2.3.5-1.1)
27
natty_rails: not-affected (2.3.5-1.2ubuntu1)
28
devel_rails: not-affected (2.3.14.1)