Moderate severityNVD Advisory· Published Jul 26, 2015· Updated May 6, 2026
CVE-2015-3224
CVE-2015-3224
Description
request.rb in Web Console before 2.1.3, as used with Ruby on Rails 3.x and 4.x, does not properly restrict the use of X-Forwarded-For headers in determining a client's IP address, which allows remote attackers to bypass the whitelisted_ips protection mechanism via a crafted request.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
web-consoleRubyGems | < 2.1.3 | 2.1.3 |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- github.com/advisories/GHSA-67j6-xv27-w6wwghsaADVISORY
- github.com/rails/web-console/blob/master/CHANGELOG.markdownnvdVendor AdvisoryWEB
- groups.google.com/forum/message/rawnvdVendor Advisory
- nvd.nist.gov/vuln/detail/CVE-2015-3224ghsaADVISORY
- lists.fedoraproject.org/pipermail/package-announce/2015-June/160881.htmlnvdWEB
- openwall.com/lists/oss-security/2015/06/16/18nvdWEB
- github.com/rubysec/ruby-advisory-db/blob/master/gems/web-console/CVE-2015-3224.ymlghsaWEB
- groups.google.com/forum/ghsaWEB
- www.securityfocus.com/bid/75237nvd
News mentions
0No linked articles in our index yet.