logo

CVE-2020-16252 field_test

Package

Manager: gem
Name: field_test
Vulnerable Version: >=0.2.0 <0.4.0

Severity

Level: Medium

CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N

EPSS: 0.00127 pctl0.32737

Details

Field Test CSRF vulnerability The Field Test dashboard is vulnerable to cross-site request forgery (CSRF) with non-session based authentication methods in versions v0.2.0 through v0.3.2. ## Impact The Field Test dashboard is vulnerable to CSRF with non-session based authentication methods, like basic authentication. Session-based authentication methods (like Devise's default authentication) are not affected. A CSRF attack works by getting an authorized user to visit a malicious website and then performing requests on behalf of the user. In this instance, a single endpoint is affected, which allows for changing the variant assigned to a user. All users running an affected release should upgrade immediately. ## Technical Details Field Test uses the `protect_from_forgery` method from Rails to prevent CSRF. However, this defaults to `:null_session`, which has no effect on non-session based authentication methods. This has been changed to `protect_from_forgery with: :exception`.

Metadata

Created: 2020-08-05T14:53:34Z
Modified: 2023-07-05T20:19:49Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2020/08/GHSA-w542-cpp9-r3g7/GHSA-w542-cpp9-r3g7.json
CWE IDs: ["CWE-352"]
Alternative ID: GHSA-w542-cpp9-r3g7
Finding: F007
Auto approve: 1