Moderate severityNVD Advisory· Published Dec 16, 2009· Updated Apr 23, 2026
CVE-2008-7248
CVE-2008-7248
Description
Ruby on Rails 2.1 before 2.1.3 and 2.2.x before 2.2.2 does not verify tokens for requests with certain content types, which allows remote attackers to bypass cross-site request forgery (CSRF) protection for requests to applications that rely on this protection, as demonstrated using text/plain.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
actionpackRubyGems | >= 2.1.0, < 2.1.3 | 2.1.3 |
actionpackRubyGems | >= 2.2.0, < 2.2.2 | 2.2.2 |
Affected products
5cpe:2.3:a:rubyonrails:rails:2.1.0:*:*:*:*:*:*:*+ 4 more
- cpe:2.3:a:rubyonrails:rails:2.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:2.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:2.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:rubyonrails:rails:2.2.1:*:*:*:*:*:*:*
Patches
1099a98e9b710Verify form submissions for text/plain posts too.
1 file changed · +1 −1
actionpack/lib/action_controller/mime_type.rb+1 −1 modified@@ -18,7 +18,7 @@ module Mime # end class Type @@html_types = Set.new [:html, :all] - @@unverifiable_types = Set.new [:text, :json, :csv, :xml, :rss, :atom, :yaml] + @@unverifiable_types = Set.new [:json, :csv, :xml, :rss, :atom, :yaml] cattr_reader :html_types, :unverifiable_types # A simple helper class used in parsing the accept header
Vulnerability mechanics
Synthesis attempt was rejected by the grounding validator. Re-run pending.
References
25- www.rorsecurity.info/journal/2008/11/19/circumvent-rails-csrf-protection.htmlnvdExploit
- secunia.com/advisories/36600nvdVendor Advisory
- www.vupen.com/english/advisories/2009/2544nvdVendor Advisory
- github.com/advisories/GHSA-8fqx-7pv4-3jwmghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2008-7248ghsaADVISORY
- groups.google.com/group/rubyonrails-security/browse_thread/thread/d741ee286e36e301nvdWEB
- lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.htmlnvdWEB
- pseudo-flaw.net/content/web-browsers/form-data-encoding-roundupghsaWEB
- weblog.rubyonrails.org/2008/11/18/potential-circumvention-of-csrf-protection-in-rails-2-1nvdWEB
- www.openwall.com/lists/oss-security/2009/11/28/1nvdWEB
- www.openwall.com/lists/oss-security/2009/12/02/2nvdWEB
- access.redhat.com/security/cve/CVE-2008-7248ghsaWEB
- bugzilla.redhat.com/show_bug.cgighsaWEB
- github.com/rails/rails/commit/099a98e9b7108dae3e0f78b207e0a7dc5913bd1aghsaWEB
- github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2008-7248.ymlghsaWEB
- groups.google.com/group/rubyonrails-security/browse_thread/thread/d741ee286e36e301ghsaWEB
- lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.htmlghsaWEB
- pseudo-flaw.net/content/web-browsers/form-data-encoding-roundupghsaWEB
- web.archive.org/web/20090906010200/https://www.vupen.com/english/advisories/2009/2544ghsaWEB
- weblog.rubyonrails.org/2008/11/18/potential-circumvention-of-csrf-protection-in-rails-2-1ghsaWEB
- www.openwall.com/lists/oss-security/2009/11/28/1ghsaWEB
- www.openwall.com/lists/oss-security/2009/12/02/2ghsaWEB
- www.rorsecurity.info/journal/2008/11/19/circumvent-rails-csrf-protection.htmlghsaWEB
- pseudo-flaw.net/content/web-browsers/form-data-encoding-roundup/nvd
- secunia.com/advisories/38915nvd
News mentions
0No linked articles in our index yet.