Vulnerability Description
The Recurly Client Ruby Library before 2.0.13, 2.1.11, 2.2.5, 2.3.10, 2.4.11, 2.5.4, 2.6.3, 2.7.8, 2.8.2, 2.9.2, 2.10.4, 2.11.3 is vulnerable to a Server-Side Request Forgery vulnerability in the "Resource#find" method that could result in compromise of API keys or other critical resources.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Recurly | Recurly Client Ruby | 2.0.0 |
Related Weaknesses (CWE)
References
- https://dev.recurly.com/page/ruby-updatesVendor Advisory
- https://github.com/recurly/recurly-client-ruby/commit/1bb0284d6e668b8b3d31167790PatchThird Party Advisory
- https://hackerone.com/reports/288635Permissions Required
- https://dev.recurly.com/page/ruby-updatesVendor Advisory
- https://github.com/recurly/recurly-client-ruby/commit/1bb0284d6e668b8b3d31167790PatchThird Party Advisory
- https://hackerone.com/reports/288635Permissions Required
FAQ
What is CVE-2017-0905?
CVE-2017-0905 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The Recurly Client Ruby Library before 2.0.13, 2.1.11, 2.2.5, 2.3.10, 2.4.11, 2.5.4, 2.6.3, 2.7.8, 2.8.2, 2.9.2, 2.10.4, 2.11.3 is vulnerable to a Server-Side Request Forgery vulnerability in the "Res...
How severe is CVE-2017-0905?
CVE-2017-0905 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2017-0905?
Check the references section above for vendor advisories and patch information. Affected products include: Recurly Recurly Client Ruby.