GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Sat Mar 14, 2020 3:26 pm Post subject: [ GLSA 202003-09 ] OpenID library for Ruby |
|
|
Gentoo Linux Security Advisory
Title: OpenID library for Ruby: Server-Side Request Forgery (GLSA 202003-09)
Severity: high
Exploitable: remote
Date: 2020-03-14
Bug(s): #698464
ID: 202003-09
Synopsis
A vulnerability in OpenID library for Ruby at worst might allow an
attacker to bypass authentication.
Background
A Ruby library for verifying and serving OpenID identities.
Affected Packages
Package: dev-ruby/ruby-openid
Vulnerable: < 2.9.2
Unaffected: >= 2.9.2
Architectures: All supported architectures
Description
It was discovered that OpenID library for Ruby performed discovery
first, and then verification.
Impact
A remote attacker could possibly change the URL used for discovery and
trick the server into connecting to the URL. This server in turn could be
a private server not
publicly accessible.
In addition, if the client that uses this library discloses connection
errors, this in turn could disclose information from the private server
to the attacker.
Workaround
There is no known workaround at this time.
Resolution
All ruby-openid users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=dev-ruby/ruby-openid-2.9.2"
|
References
CVE-2019-11027
Last edited by GLSA on Sun Mar 15, 2020 4:17 am; edited 1 time in total |
|