CVE-2017-18076

In strategy.rb in OmniAuth before 1.3.2, the authenticity_token value is improperly protected because POST (in addition to GET) parameters are stored in the session and become available in the environment of the callback phase.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
mitreCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 63%
VendorProductVersion
omniauthomniauth
𝑥
< 1.3.2
debiandebian_linux
8.0
debiandebian_linux
9.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
ruby-omniauth
bullseye
1.9.1-1
fixed
sid
2.1.1-1
fixed
trixie
2.1.1-1
fixed
bookworm
2.1.1-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
ruby-omniauth
disco
not-affected
cosmic
not-affected
bionic
not-affected
artful
Fixed 1.3.1-1+deb9u1build0.17.10.1
released
xenial
Fixed 1.3.1-1+deb9u1build0.16.04.1
released
trusty
dne