Lucene search

K
gitlabHttps://gitlab.com/gitlab-org/security-products/gemnasium-dbGITLAB-D20DB60278DC37FA50BB96925C07DD06
HistoryOct 24, 2017 - 12:00 a.m.

Improper Input Validation

2017-10-2400:00:00
https://gitlab.com/gitlab-org/security-products/gemnasium-db
gitlab.com
5

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.016

Percentile

87.5%

The to_s method in actionpack/lib/action_dispatch/middleware/remote_ip.rb in Ruby on Rails 3.0.5 does not validate the X-Forwarded-For header in requests from IP addresses on a Class C network, which might allow remote attackers to inject arbitrary text into log files or bypass intended address parsing via a crafted header.

Affected configurations

Vulners
Node
gemactionpackRange2.3.0
OR
gemactionpackRange<2.3.13
VendorProductVersionCPE
gemactionpack*cpe:2.3:a:gem:actionpack:*:*:*:*:*:*:*:*

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.016

Percentile

87.5%