Vulnerability Description
Ruby OpenID (aka ruby-openid) through 2.8.0 has a remotely exploitable flaw. This library is used by Rails web applications to integrate with OpenID Providers. Severity can range from medium to critical, depending on how a web application developer chose to employ the ruby-openid library. Developers who based their OpenID integration heavily on the "example app" provided by the project are at highest risk.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Openid | Ruby-Openid | <= 2.8.0 |
References
- https://github.com/openid/ruby-openid/issues/122
- https://lists.debian.org/debian-lts-announce/2019/10/msg00014.html
- https://marc.info/?l=openid-security&m=155154717027534&w=2Mailing ListThird Party Advisory
- https://security.gentoo.org/glsa/202003-09
- https://github.com/openid/ruby-openid/issues/122
- https://lists.debian.org/debian-lts-announce/2019/10/msg00014.html
- https://marc.info/?l=openid-security&m=155154717027534&w=2Mailing ListThird Party Advisory
- https://security.gentoo.org/glsa/202003-09
FAQ
What is CVE-2019-11027?
CVE-2019-11027 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Ruby OpenID (aka ruby-openid) through 2.8.0 has a remotely exploitable flaw. This library is used by Rails web applications to integrate with OpenID Providers. Severity can range from medium to critic...
How severe is CVE-2019-11027?
CVE-2019-11027 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-11027?
Check the references section above for vendor advisories and patch information. Affected products include: Openid Ruby-Openid.