GHSA-w3j4-76qw-wwjm

Suggest an improvement
Source
https://github.com/advisories/GHSA-w3j4-76qw-wwjm
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/09/GHSA-w3j4-76qw-wwjm/GHSA-w3j4-76qw-wwjm.json
JSON Data
https://api.test.osv.dev/v1/vulns/GHSA-w3j4-76qw-wwjm
Aliases
Published
2021-09-07T23:08:24Z
Modified
2023-11-01T04:56:05.445196Z
Severity
  • 6.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N CVSS Calculator
Summary
Older releases of better_errors open to Cross-Site Request Forgery attack
Details

Impact

bettererrors prior to 2.8.0 did not implement CSRF protection for its internal requests. It also did not enforce the correct "Content-Type" header for these requests, which allowed a cross-origin "simple request" to be made without CORS protection. These together left an application with bettererrors enabled open to cross-origin attacks.

As a developer tool, bettererrors documentation strongly recommends addition only to the development bundle group, so this vulnerability should only affect development environments. Please ensure that your project limits bettererrors to the development group (or the non-Rails equivalent).

Patches

Starting with release 2.8.x, CSRF protection is enforced. It is recommended that you upgrade to the latest release, or minimally to "~> 2.8.3".

Workarounds

There are no known workarounds to mitigate the risk of using older releases of better_errors.

References

For more information

If you have any questions or comments about this advisory, please - Add to the discussion in bettererrors - Open an issue in bettererrors

Database specific
{
    "nvd_published_at": "2021-09-07T18:15:00Z",
    "cwe_ids": [
        "CWE-352"
    ],
    "severity": "MODERATE",
    "github_reviewed": true,
    "github_reviewed_at": "2021-09-07T17:58:52Z"
}
References

Affected packages

RubyGems / better_errors

Package

Name
better_errors
Purl
pkg:gem/better_errors

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.8.0

Affected versions

0.*

0.0.1
0.0.2
0.0.3
0.0.4
0.0.5
0.0.6
0.0.7
0.0.8
0.1.0
0.1.1
0.2.0
0.3.0
0.3.2
0.5.0
0.6.0
0.7.0
0.7.2
0.8.0
0.9.0

1.*

1.0.0.rc1
1.0.0
1.0.1
1.1.0

2.*

2.0.0
2.1.0
2.1.1
2.2.0
2.3.0
2.4.0
2.5.0
2.5.1
2.6.0
2.7.0
2.7.1