Skip to content

rails vulnerable to improper authentication

Critical severity GitHub Reviewed Published Oct 24, 2017 to the GitHub Advisory Database • Updated Feb 13, 2024

Package

bundler rails (RubyGems)

Affected versions

< 2.3.3

Patched versions

2.3.3

Description

The example code for the digest authentication functionality (http_authentication.rb) in Ruby on Rails before 2.3.3 defines an authenticate_or_request_with_http_digest block that returns nil instead of false when the user does not exist, which allows context-dependent attackers to bypass authentication for applications that are derived from this example by sending an invalid username without a password.

References

Published by the National Vulnerability Database Jul 10, 2009
Published to the GitHub Advisory Database Oct 24, 2017
Reviewed Jun 16, 2020
Last updated Feb 13, 2024

Severity

Critical
9.8
/ 10

CVSS base metrics

Attack vector
Network
Attack complexity
Low
Privileges required
None
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Weaknesses

CVE ID

CVE-2009-2422

GHSA ID

GHSA-rxq3-gm4p-5fj4

Source code

No known source code
Checking history
See something to contribute? Suggest improvements for this vulnerability.