Short Name |
HTTP:XSS:X-FORWARDED-FOR-INJ |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
X-Forwarded-For Cross-Site Script Injection |
Release Date |
2011/03/28 |
Update Number |
1889 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known flaw in Ruby-on-Rails and Zenphoto. Other web languages and applications may also be vulnerable. An attacker may send a malformed HTTP 'X-Forwarded-For' header which could inject scripts into a user's web browser. A successful attack could result in arbitrary script execution on the target's host. Alternatively, some proxies do not follow internet standards and will improperly modify this header, which will trigger this Attack Object.
Ruby on Rails is prone to a vulnerability that allows attackers to inject arbitrary content into the 'X-Forwarded-For', 'X-Forwarded-Host' and 'X-Forwarded-Server' HTTP headers because the 'WEBrick::HTTPRequest' module fails to sufficiently sanitize input. By inserting arbitrary data into the affected HTTP header field, attackers may be able to launch cross-site request-forgery, cross-site scripting, HTML-injection, and other attacks. NOTE: This issue only affects requests sent from clients on the same subnet as the server. Ruby on Rails 3.0.5 is vulnerable; other versions may also be affected.