Vulnerabilites related to openid - ruby-openid
CVE-2019-11027 (GCVE-0-2019-11027)
Vulnerability from cvelistv5
Published
2019-06-10 18:57
Modified
2024-08-04 22:40
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Ruby OpenID (aka ruby-openid) through 2.8.0 has a remotely exploitable flaw. This library is used by Rails web applications to integrate with OpenID Providers. Severity can range from medium to critical, depending on how a web application developer chose to employ the ruby-openid library. Developers who based their OpenID integration heavily on the "example app" provided by the project are at highest risk.
References
▼ | URL | Tags |
---|---|---|
https://marc.info/?l=openid-security&m=155154717027534&w=2 | x_refsource_MISC | |
https://github.com/openid/ruby-openid/issues/122 | x_refsource_MISC | |
https://lists.debian.org/debian-lts-announce/2019/10/msg00014.html | mailing-list, x_refsource_MLIST | |
https://security.gentoo.org/glsa/202003-09 | vendor-advisory, x_refsource_GENTOO |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T22:40:15.991Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://marc.info/?l=openid-security\u0026m=155154717027534\u0026w=2" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/openid/ruby-openid/issues/122" }, { "name": "[debian-lts-announce] 20191011 [SECURITY] [DLA 1956-1] ruby-openid security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00014.html" }, { "name": "GLSA-202003-09", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "https://security.gentoo.org/glsa/202003-09" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Ruby OpenID (aka ruby-openid) through 2.8.0 has a remotely exploitable flaw. This library is used by Rails web applications to integrate with OpenID Providers. Severity can range from medium to critical, depending on how a web application developer chose to employ the ruby-openid library. Developers who based their OpenID integration heavily on the \"example app\" provided by the project are at highest risk." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-14T16:06:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://marc.info/?l=openid-security\u0026m=155154717027534\u0026w=2" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/openid/ruby-openid/issues/122" }, { "name": "[debian-lts-announce] 20191011 [SECURITY] [DLA 1956-1] ruby-openid security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00014.html" }, { "name": "GLSA-202003-09", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "https://security.gentoo.org/glsa/202003-09" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-11027", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Ruby OpenID (aka ruby-openid) through 2.8.0 has a remotely exploitable flaw. This library is used by Rails web applications to integrate with OpenID Providers. Severity can range from medium to critical, depending on how a web application developer chose to employ the ruby-openid library. Developers who based their OpenID integration heavily on the \"example app\" provided by the project are at highest risk." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://marc.info/?l=openid-security\u0026m=155154717027534\u0026w=2", "refsource": "MISC", "url": "https://marc.info/?l=openid-security\u0026m=155154717027534\u0026w=2" }, { "name": "https://github.com/openid/ruby-openid/issues/122", "refsource": "MISC", "url": "https://github.com/openid/ruby-openid/issues/122" }, { "name": "[debian-lts-announce] 20191011 [SECURITY] [DLA 1956-1] ruby-openid security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00014.html" }, { "name": "GLSA-202003-09", "refsource": "GENTOO", "url": "https://security.gentoo.org/glsa/202003-09" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2019-11027", "datePublished": "2019-06-10T18:57:09", "dateReserved": "2019-04-09T00:00:00", "dateUpdated": "2024-08-04T22:40:15.991Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2019-06-10 19:29
Modified
2024-11-21 04:20
Severity ?
Summary
Ruby OpenID (aka ruby-openid) through 2.8.0 has a remotely exploitable flaw. This library is used by Rails web applications to integrate with OpenID Providers. Severity can range from medium to critical, depending on how a web application developer chose to employ the ruby-openid library. Developers who based their OpenID integration heavily on the "example app" provided by the project are at highest risk.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
openid | ruby-openid | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:openid:ruby-openid:*:*:*:*:*:*:*:*", "matchCriteriaId": "7301C564-3712-4F9C-AD7E-80BDDB698B2B", "versionEndIncluding": "2.8.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Ruby OpenID (aka ruby-openid) through 2.8.0 has a remotely exploitable flaw. This library is used by Rails web applications to integrate with OpenID Providers. Severity can range from medium to critical, depending on how a web application developer chose to employ the ruby-openid library. Developers who based their OpenID integration heavily on the \"example app\" provided by the project are at highest risk." }, { "lang": "es", "value": "Ruby OpenID (conocido como ruby-openid) a trav\u00e9s de la versi\u00f3n 2.8.0 tiene un defecto aprovechable remotamente. Esta librer\u00eda es usada para aplicaciones de Rails Web, para integrar con suministradores de OpenID. La gravedad puede ir desde media a cr\u00edtica, dependiendo de como los desarrolladores de aplicaciones Web eligieron para emplear la ruby-openid library. Los desarrolladores que basaron su integraci\u00f3n OpenID fuertemente en el ejemplo \"example app\" proporcionado por el proyecto est\u00e1n en alto riesgo." } ], "id": "CVE-2019-11027", "lastModified": "2024-11-21T04:20:23.567", "metrics": { "cvssMetricV2": [ { "acInsufInfo": true, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 3.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-06-10T19:29:00.607", "references": [ { "source": "cve@mitre.org", "url": "https://github.com/openid/ruby-openid/issues/122" }, { "source": "cve@mitre.org", "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00014.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://marc.info/?l=openid-security\u0026m=155154717027534\u0026w=2" }, { "source": "cve@mitre.org", "url": "https://security.gentoo.org/glsa/202003-09" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://github.com/openid/ruby-openid/issues/122" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00014.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://marc.info/?l=openid-security\u0026m=155154717027534\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://security.gentoo.org/glsa/202003-09" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }