CVE-2015-3224

Scores

EPSS

0.853high85.3%
0%20%40%60%80%100%

Percentile: 85.3%

CVSS

4.3medium2.0
0246810

CVSS Score: 4.3/10

All CVSS Scores

CVSS 2.0
4.3

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Description

request.rb in Web Console before 2.1.3, as used with Ruby on Rails 3.x and 4.x, does not properly restrict the use of X-Forwarded-For headers in determining a client’s IP address, which allows remote attackers to bypass the whitelisted_ips protection mechanism via a crafted request.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-284

Exploits

Exploit ID: 41689

Source: exploitdb

URL: https://www.exploit-db.com/exploits/41689

Exploit ID: CVE-2015-3224

Source: github-poc

URL: https://github.com/SQU4NCH/CVE-2015-3224

Vulnerable Software (1)

Type: Configuration

Vendor: *

Product: web_console

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:rubyonrails:web_console:*:*:*:*:*:*:*:*",      "versionEndIncluding": "2.1.2",      "vulnerable": true    }  ],  "operator": "OR"}

Source: nvd

End of list