CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
EPSS
Percentile
87.5%
The to_s method in actionpack/lib/action_dispatch/middleware/remote_ip.rb in Ruby on Rails 3.0.5 does not validate the X-Forwarded-For header in requests from IP addresses on a Class C network, which might allow remote attackers to inject arbitrary text into log files or bypass intended address parsing via a crafted header.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | rails | <= 2:6.1.7.3+dfsg-2~deb12u1 | rails_2:6.1.7.3+dfsg-2~deb12u1_all.deb |
Debian | 11 | all | rails | <= 2:6.0.3.7+dfsg-2+deb11u2 | rails_2:6.0.3.7+dfsg-2+deb11u2_all.deb |
Debian | 999 | all | rails | <= 2:6.1.7.3+dfsg-4 | rails_2:6.1.7.3+dfsg-4_all.deb |
Debian | 13 | all | rails | <= 2:6.1.7.3+dfsg-3 | rails_2:6.1.7.3+dfsg-3_all.deb |