Skip to content

Conversation

@arthurchui
Copy link

The request phase of the OmniAuth Ruby gem (1.9.2 and earlier) is vulnerable to Cross-Site Request Forgery. This permits a secondary account to be able to sign into the web application as the primary account. It is recommended to upgrade OmniAuth to >=2.0. As of v2.0.0, OmniAuth by default allows only POST to its own routes. Instead of redirecting user from /github/auth/github to Github, it first redirects users to /github/auth/github/login where users trigger a POST request to /github/auth/github and then get redirected to Github.

References: https://github.com/omniauth/omniauth/wiki/Resolving-CVE-2015-9284

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant