Ruby on Rails jquery-ujs和jquery-rails安全绕过漏洞 CVE-2015-1840 CNVD-2015-04095 CNNVD-201506-457

5.0 AV AC AU C I A
发布: 2015-07-26
修订: 2018-10-30

### Impact In the scenario where an attacker might be able to control the href attribute of an anchor tag or the action attribute of a form tag that will trigger a POST action, the attacker can set the href or action to " https://attacker.com" (note the leading space) that will be passed to JQuery, who will see this as a same origin request, and send the user's CSRF token to the attacker domain. ### Releases The FIXED releases are available at the normal locations. ### Workarounds To work around this problem, change code that allows users to control the href attribute of an anchor tag or the action attribute of a form tag to filter the user parameters. For example, code like this: link_to params to code like this: link_to filtered_params def filtered_params # Filter just the parameters that you trust end ### 参考 * https://groups.google.com/forum/#!topic/rubyonrails-security/XIZPbobuwaY

0%
暂无可用Exp或PoC
当前有8条受影响产品信息