IP whitelist bypass in Web Console

Metadata

medium
4.3
web-console
CVE-2015-3224
groups.google.com
2015-06-16
2017-06-16 19:14
2017-04-01 19:10
2017-01-05 20:15

Description

Specially crafted remote requests can spoof their origin, bypassing the IP whitelist, in any environment where Web Console is enabled (development and test, by default).

Users whose application is only accessible from localhost (as is the default behaviour in Rails 4.2) are not affected, unless a local proxy is involved.

All affected users should either upgrade or use one of the work arounds immediately.

To work around this issue, turn off web-console in all environments, by removing/commenting it from the application's Gemfile.

Am I vulnerable?

The constraints below list the versions that this vulnerability is patched in, and versions that are unaffected. If a patch is ready but unrealeased, then it is pending.

Or, you can just let us figure it out for you! Appcanary continously monitor your installed packages, and tell you if any of them are vulnerable.

Sign up for monitoring

Affected package information

Package Patched in Unaffected in
web-console >= 2.1.3 None