request.rb in Web Console before 2.1.3, as used with Ruby on Rails 3.x and 4.x, does not properly restrict the use of X-Forwarded-For headers in determining a clientโs IP address, which allows remote attackers to bypass the whitelisted_ips protection mechanism via a crafted request.
CPE | Name | Operator | Version |
---|---|---|---|
web-console | lt | 2.1.3 |
lists.fedoraproject.org/pipermail/package-announce/2015-June/160881.html
openwall.com/lists/oss-security/2015/06/16/18
github.com/advisories/GHSA-67j6-xv27-w6ww
github.com/rails/web-console/blob/master/CHANGELOG.markdown
github.com/rubysec/ruby-advisory-db/blob/master/gems/web-console/CVE-2015-3224.yml
groups.google.com/forum/#!topic/ruby-security-ann/lzmz9_ijUFw
nvd.nist.gov/vuln/detail/CVE-2015-3224