The request phase of the OmniAuth Ruby gem (1.9.1 and earlier) is vulnerable to Cross-Site Request Forgery when used as part of the Ruby on Rails framework, allowing accounts to be connected without user intent, user interaction, or feedback to the user. This permits a secondary account to be able to sign into the web application as the primary account.
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Omniauth | Omniauth | * | 2.0.0 (excluding) |
Ruby-omniauth | Ubuntu | bionic | * |
Ruby-omniauth | Ubuntu | cosmic | * |
Ruby-omniauth | Ubuntu | devel | * |
Ruby-omniauth | Ubuntu | disco | * |
Ruby-omniauth | Ubuntu | eoan | * |
Ruby-omniauth | Ubuntu | esm-apps/bionic | * |
Ruby-omniauth | Ubuntu | esm-apps/focal | * |
Ruby-omniauth | Ubuntu | esm-apps/jammy | * |
Ruby-omniauth | Ubuntu | esm-apps/noble | * |
Ruby-omniauth | Ubuntu | esm-apps/xenial | * |
Ruby-omniauth | Ubuntu | focal | * |
Ruby-omniauth | Ubuntu | groovy | * |
Ruby-omniauth | Ubuntu | hirsute | * |
Ruby-omniauth | Ubuntu | impish | * |
Ruby-omniauth | Ubuntu | jammy | * |
Ruby-omniauth | Ubuntu | kinetic | * |
Ruby-omniauth | Ubuntu | lunar | * |
Ruby-omniauth | Ubuntu | mantic | * |
Ruby-omniauth | Ubuntu | noble | * |
Ruby-omniauth | Ubuntu | oracular | * |
Ruby-omniauth | Ubuntu | upstream | * |
Ruby-omniauth | Ubuntu | xenial | * |