Cross-Site Request Forgery (CSRF) in trestle-auth
High severity
GitHub Reviewed
Published
Apr 12, 2021
in
TrestleAdmin/trestle-auth
•
Updated May 4, 2023
Description
Reviewed
Apr 13, 2021
Published to the GitHub Advisory Database
Apr 13, 2021
Published by the National Vulnerability Database
Apr 13, 2021
Last updated
May 4, 2023
Impact
A vulnerability in trestle-auth versions 0.4.0 and 0.4.1 allows an attacker to create a form that will bypass Rails' built-in CSRF protection when submitted by a victim with a trestle-auth admin session. This potentially allows an attacker to alter protected data, including admin account credentials.
Patches
The vulnerability has been fixed in trestle-auth 0.4.2 released to RubyGems.
For more information
If you have any questions or comments about this advisory:
References