HTTP: X-Forwarded-For Cross-Site Script Injection

This signature detects attempts to exploit a known flaw in Ruby-on-Rails and Zenphoto. Other web languages and applications may also be vulnerable. An attacker may send a malformed HTTP 'X-Forwarded-For' header which could inject scripts into a user's web browser. A successful attack could result in arbitrary script execution on the target's host. Alternatively, some proxies do not follow internet standards and will improperly modify this header, which will trigger this Attack Object.

Extended Description

Ruby on Rails is prone to a vulnerability that allows attackers to inject arbitrary content into the 'X-Forwarded-For', 'X-Forwarded-Host' and 'X-Forwarded-Server' HTTP headers because the 'WEBrick::HTTPRequest' module fails to sufficiently sanitize input. By inserting arbitrary data into the affected HTTP header field, attackers may be able to launch cross-site request-forgery, cross-site scripting, HTML-injection, and other attacks. NOTE: This issue only affects requests sent from clients on the same subnet as the server. Ruby on Rails 3.0.5 is vulnerable; other versions may also be affected.

Affected Products

Ruby_on_rails ruby_on_rails

Short Name
HTTP:XSS:X-FORWARDED-FOR-INJ
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
CVE-2020-2231 CVE-2023-1658 Cross-Site Injection Script X-Forwarded-For bid:46423 bid:47544
Release Date
03/28/2011
Supported Platforms

srx-branch-12.3

srx-branch-19.3

vsrx3bsd-19.2

vsrx3bsd-19.4

srx-branch-19.4

vsrx-19.4

srx-19.4

vsrx-12.3

srx-12.3

vsrx-19.2

srx-19.3

vmx-19.4

mx-12.3

mx-19.4

mx-19.3

vmx-19.3

Sigpack Version
3590
False Positive
Unknown
Vendors

Ruby_on_rails

Found a potential security threat?