Vulnerability Description
trestle-auth is an authentication plugin for the Trestle admin framework. A vulnerability in trestle-auth versions 0.4.0 and 0.4.1 allows an attacker to create a form that will bypass Rails' built-in CSRF protection when submitted by a victim with a trestle-auth admin session. This potentially allows an attacker to alter protected data, including admin account credentials. The vulnerability has been fixed in trestle-auth 0.4.2 released to RubyGems.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trestle-Auth Project | Trestle-Auth | 0.4.0 |
Related Weaknesses (CWE)
References
- https://github.com/TrestleAdmin/trestle-auth/commit/cb95b05cdb2609052207af07b4b8PatchThird Party Advisory
- https://github.com/TrestleAdmin/trestle-auth/security/advisories/GHSA-h8hx-2c5r-Third Party Advisory
- https://rubygems.org/gems/trestle-authProductThird Party Advisory
- https://github.com/TrestleAdmin/trestle-auth/commit/cb95b05cdb2609052207af07b4b8PatchThird Party Advisory
- https://github.com/TrestleAdmin/trestle-auth/security/advisories/GHSA-h8hx-2c5r-Third Party Advisory
- https://rubygems.org/gems/trestle-authProductThird Party Advisory
FAQ
What is CVE-2021-29435?
CVE-2021-29435 is a vulnerability with a CVSS score of 8.1 (HIGH). trestle-auth is an authentication plugin for the Trestle admin framework. A vulnerability in trestle-auth versions 0.4.0 and 0.4.1 allows an attacker to create a form that will bypass Rails' built-in ...
How severe is CVE-2021-29435?
CVE-2021-29435 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-29435?
Check the references section above for vendor advisories and patch information. Affected products include: Trestle-Auth Project Trestle-Auth.