Ruby OpenID (aka ruby-openid) through 2.8.0 is vulnerable to SSRF. Ruby-openid performs discovery first, and then verification. This allows an attacker to change the URL used for discovery and trick the server into connecting to the URL, which might be a private server not publicly accessible. Severity can range from medium to critical, depending on how a web application developer chose to employ the ruby-openid library. Developers who based their OpenID integration heavily on the “example app” provided by the project are at highest risk.
CPE | Name | Operator | Version |
---|---|---|---|
ruby-openid | eq | 2.3.0 | |
ruby-openid | eq | 2.2.0 | |
ruby-openid | eq | 2.1.2 | |
ruby-openid | eq | 1.1.1 | |
ruby-openid | eq | 2.1.7 | |
ruby-openid | eq | 1.1.2 | |
ruby-openid | eq | 2.0.3 | |
ruby-openid | eq | 2.0.1 | |
ruby-openid | eq | 2.4.0 | |
ruby-openid | eq | 2.2.2 |
github.com/openid/ruby-openid
github.com/openid/ruby-openid/commit/d181a8a2099c64365a1d24b29f6b6b646673a131
github.com/openid/ruby-openid/issues/122
github.com/openid/ruby-openid/releases/tag/v2.9.0
github.com/rubysec/ruby-advisory-db/blob/master/gems/ruby-openid/CVE-2019-11027.yml
lists.debian.org/debian-lts-announce/2019/10/msg00014.html
marc.info/?l=openid-security&m=155154717027534&w=2
nvd.nist.gov/vuln/detail/CVE-2019-11027
security.gentoo.org/glsa/202003-09