Medium severity4.3NVD Advisory· Published Jul 2, 2020· Updated Apr 28, 2026
CVE-2020-8166
CVE-2020-8166
Description
A CSRF forgery vulnerability exists in rails < 5.2.5, rails < 6.0.4 that makes it possible for an attacker to, given a global CSRF token such as the one present in the authenticity_token meta tag, forge a per-form CSRF token.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
actionpackRubyGems | >= 5.0.0, < 5.2.4.3 | 5.2.4.3 |
actionpackRubyGems | >= 6.0.0, < 6.0.3.1 | 6.0.3.1 |
Affected products
2- cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Patches
27b5cc5a5dfcf34991a6ae2fcVulnerability mechanics
Synthesis attempt was rejected by the grounding validator. Re-run pending.
References
7- groups.google.com/g/rubyonrails-security/c/NOjKiGeXUgwnvdMailing ListPatchThird Party AdvisoryWEB
- hackerone.com/reports/732415nvdExploitThird Party AdvisoryWEB
- github.com/advisories/GHSA-jp5v-5gx4-jmj9ghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2020-8166ghsaADVISORY
- www.debian.org/security/2020/dsa-4766nvdThird Party AdvisoryWEB
- github.com/rubysec/ruby-advisory-db/blob/master/gems/actionpack/CVE-2020-8166.ymlghsaWEB
- groups.google.com/forum/ghsaWEB
News mentions
0No linked articles in our index yet.