CVE-2008-5189
Severity CVSS v4.0:
Pending analysis
Type:
CWE-352
Cross-Site Request Forgery (CSRF)
Publication date:
21/11/2008
Last modified:
09/04/2025
Description
CRLF injection vulnerability in Ruby on Rails before 2.0.5 allows remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via a crafted URL to the redirect_to function.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:rubyonrails:rails:0.9.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:rubyonrails:rails:0.9.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:rubyonrails:rails:0.9.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:rubyonrails:rails:0.9.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:rubyonrails:rails:0.9.4.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:rubyonrails:rails:0.10.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:rubyonrails:rails:0.10.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:rubyonrails:rails:0.11.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:rubyonrails:rails:0.11.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:rubyonrails:rails:0.12.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:rubyonrails:rails:0.12.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:rubyonrails:rails:0.13.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:rubyonrails:rails:0.13.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:rubyonrails:rails:0.14.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:rubyonrails:rails:0.14.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://github.com/rails/rails/commit/7282ed863ca7e6f928bae9162c9a63a98775a19d
- http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html
- http://weblog.rubyonrails.org/2008/10/19/rails-2-0-5-redirect_to-and-offset-limit-sanitizing
- http://weblog.rubyonrails.org/2008/10/19/response-splitting-risk
- http://www.securityfocus.com/bid/32359
- http://github.com/rails/rails/commit/7282ed863ca7e6f928bae9162c9a63a98775a19d
- http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html
- http://weblog.rubyonrails.org/2008/10/19/rails-2-0-5-redirect_to-and-offset-limit-sanitizing
- http://weblog.rubyonrails.org/2008/10/19/response-splitting-risk
- http://www.securityfocus.com/bid/32359