Advisory Database
  • Advisories
  • Dependency Scanning
  1. gem
  2. ›
  3. actionpack
  4. ›
  5. CVE-2011-3187

CVE-2011-3187: Improper Input Validation

October 24, 2017 (updated August 31, 2021)

The to_s method in actionpack/lib/action_dispatch/middleware/remote_ip.rb in Ruby on Rails 3.0.5 does not validate the X-Forwarded-For header in requests from IP addresses on a Class C network, which might allow remote attackers to inject arbitrary text into log files or bypass intended address parsing via a crafted header.

References

  • archives.neohapsis.com/archives/fulldisclosure/2011-02/0337.html
  • webservsec.blogspot.com/2011/02/ruby-on-rails-vulnerability.html
  • www.openwall.com/lists/oss-security/2011/08/17/1
  • www.openwall.com/lists/oss-security/2011/08/19/11
  • www.openwall.com/lists/oss-security/2011/08/20/1
  • www.openwall.com/lists/oss-security/2011/08/22/13
  • www.openwall.com/lists/oss-security/2011/08/22/14
  • www.openwall.com/lists/oss-security/2011/08/22/5
  • bugzilla.novell.com/show_bug.cgi?id=673010
  • github.com/advisories/GHSA-3vfw-7rcp-3xgm
  • nvd.nist.gov/vuln/detail/CVE-2011-3187

Code Behaviors & Features

Detect and mitigate CVE-2011-3187 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 2.3.0 before 2.3.13

Fixed versions

  • 2.3.13

Solution

Upgrade to version 2.3.13 or above.

Impact 4.3 MEDIUM

AV:N/AC:M/Au:N/C:N/I:P/A:N

Learn more about CVSS

Weakness

  • CWE-20: Improper Input Validation

Source file

gem/actionpack/CVE-2011-3187.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Wed, 14 May 2025 12:15:24 +0000.