Ruby/devise/1.5.0
Flexible authentication solution for Rails with Warden
Repo Link:
https://rubygems.org/gems/devise
License:
UNKNOWN
8 Security Vulnerabilities
Published date: 2019-03-19T18:03:25Z
CVE: CVE-2019-5421
Devise ruby gem before 4.6.0 when the lockable
module is used is vulnerable to a time-of-check time-of-use (TOCTOU) race condition due to increment_failed_attempts
within the Devise::Models::Lockable
class not being concurrency safe.
Affected versions:
["4.1.0", "4.0.3", "4.0.1", "4.0.0", "3.5.8", "3.5.7", "3.5.2", "3.5.1", "3.4.1", "3.4.0", "3.3.0", "3.2.4", "3.2.0", "3.1.2", "3.1.0.rc2", "3.0.4", "3.0.2", "2.2.8", "2.2.6", "2.2.5", "2.2.4", "2.2.2", "2.1.4", "2.1.2", "2.1.0", "2.1.0.rc", "2.0.5", "2.0.0.rc", "1.5.4", "1.5.2", "1.5.1", "1.5.0", "1.4.7", "1.4.2", "1.2.0", "1.2.rc", "1.1.8", "1.1.7", "1.1.3", "1.1.2", "1.1.0", "1.1.rc2", "1.1.pre4", "1.1.pre3", "1.1.pre", "1.0.11", "1.0.9", "1.0.8", "1.0.7", "1.0.4", "1.0.3", "1.0.2", "1.0.0", "0.9.2", "0.9.0", "0.8.1", "0.8.0", "0.7.5", "0.7.4", "0.7.3", "0.7.2", "0.7.0", "0.6.3", "0.6.2", "0.6.0", "0.5.6", "0.5.4", "0.5.3", "0.5.1", "0.4.3", "0.4.2", "0.3.0", "0.2.3", "0.2.1", "4.5.0", "4.4.3", "4.4.2", "4.4.1", "4.4.0", "4.3.0", "4.2.1", "4.2.0", "4.1.1", "4.0.2", "4.0.0.rc2", "4.0.0.rc1", "3.5.10", "3.5.9", "3.5.6", "3.5.5", "3.5.4", "3.5.3", "3.2.3", "3.2.2", "3.2.1", "3.1.1", "3.1.0", "3.0.3", "3.0.1", "3.0.0", "3.0.0.rc", "2.2.7", "2.2.3", "2.2.1", "2.2.0", "2.2.0.rc", "2.1.3", "2.1.0.rc2", "2.0.6", "2.0.4", "2.0.2", "2.0.1", "2.0.0", "2.0.0.rc2", "1.5.3", "1.5.0.rc1", "1.4.9", "1.4.8", "1.4.5", "1.4.3", "1.4.1", "1.3.4", "1.3.3", "1.3.2", "1.3.1", "1.3.0", "1.2.1", "1.2.rc2", "1.1.9", "1.1.6", "1.1.5", "1.1.4", "1.1.1", "1.1.rc1", "1.1.rc0", "1.1.pre2", "1.0.10", "1.0.6", "1.0.5", "1.0.1", "0.9.1", "0.8.2", "0.7.1", "0.6.1", "0.5.5", "0.5.2", "0.5.0", "0.4.1", "0.4.0", "0.2.2", "0.2.0", "0.1.1", "0.1.0"]
Secure versions:
[4.7.1, 4.7.2, 4.7.3, 4.8.0, 4.8.1, 4.9.0, 4.9.1, 4.9.2, 4.9.3, 4.9.4]
Recommendation:
Update to version 4.9.4.
Published date: 2023-01-26T23:54:07Z
CVE: CVE-2015-8314
Devise version before 3.5.4 uses cookies to implement a Remember me functionality. However, it generates the same cookie for all devices. If an attacker manages to steal a remember me cookie and the user does not change the password frequently, the cookie can be used to gain access to the application indefinitely.
Affected versions:
["3.5.2", "3.5.1", "3.4.1", "3.4.0", "3.3.0", "3.2.4", "3.2.0", "3.1.2", "3.1.0.rc2", "3.0.4", "3.0.2", "2.2.8", "2.2.6", "2.2.5", "2.2.4", "2.2.2", "2.1.4", "2.1.2", "2.1.0", "2.1.0.rc", "2.0.5", "2.0.0.rc", "1.5.4", "1.5.2", "1.5.1", "1.5.0", "1.4.7", "1.4.2", "1.2.0", "1.2.rc", "1.1.8", "1.1.7", "1.1.3", "1.1.2", "1.1.0", "1.1.rc2", "1.1.pre4", "1.1.pre3", "1.1.pre", "1.0.11", "1.0.9", "1.0.8", "1.0.7", "1.0.4", "1.0.3", "1.0.2", "1.0.0", "0.9.2", "0.9.0", "0.8.1", "0.8.0", "0.7.5", "0.7.4", "0.7.3", "0.7.2", "0.7.0", "0.6.3", "0.6.2", "0.6.0", "0.5.6", "0.5.4", "0.5.3", "0.5.1", "0.4.3", "0.4.2", "0.3.0", "0.2.3", "0.2.1", "3.5.3", "3.2.3", "3.2.2", "3.2.1", "3.1.1", "3.1.0", "3.0.3", "3.0.1", "3.0.0", "3.0.0.rc", "2.2.7", "2.2.3", "2.2.1", "2.2.0", "2.2.0.rc", "2.1.3", "2.1.0.rc2", "2.0.6", "2.0.4", "2.0.2", "2.0.1", "2.0.0", "2.0.0.rc2", "1.5.3", "1.5.0.rc1", "1.4.9", "1.4.8", "1.4.5", "1.4.3", "1.4.1", "1.3.4", "1.3.3", "1.3.2", "1.3.1", "1.3.0", "1.2.1", "1.2.rc2", "1.1.9", "1.1.6", "1.1.5", "1.1.4", "1.1.1", "1.1.rc1", "1.1.rc0", "1.1.pre2", "1.0.10", "1.0.6", "1.0.5", "1.0.1", "0.9.1", "0.8.2", "0.7.1", "0.6.1", "0.5.5", "0.5.2", "0.5.0", "0.4.1", "0.4.0", "0.2.2", "0.2.0", "0.1.1", "0.1.0"]
Secure versions:
[4.7.1, 4.7.2, 4.7.3, 4.8.0, 4.8.1, 4.9.0, 4.9.1, 4.9.2, 4.9.3, 4.9.4]
Recommendation:
Update to version 4.9.4.
Published date: 2019-09-11T23:06:57Z
CVE: CVE-2019-16109
An issue was discovered in Plataformatec Devise before 4.7.1. It confirms accounts upon receiving a request with a blank confirmationtoken, if a database record has a blank value in the confirmation token column. (However, there is no scenario within Devise itself in which such database records would exist.)
Affected versions:
["4.7.0", "4.6.2", "4.6.0", "4.1.0", "4.0.3", "4.0.1", "4.0.0", "3.5.8", "3.5.7", "3.5.2", "3.5.1", "3.4.1", "3.4.0", "3.3.0", "3.2.4", "3.2.0", "3.1.2", "3.1.0.rc2", "3.0.4", "3.0.2", "2.2.8", "2.2.6", "2.2.5", "2.2.4", "2.2.2", "2.1.4", "2.1.2", "2.1.0", "2.1.0.rc", "2.0.5", "2.0.0.rc", "1.5.4", "1.5.2", "1.5.1", "1.5.0", "1.4.7", "1.4.2", "1.2.0", "1.2.rc", "1.1.8", "1.1.7", "1.1.3", "1.1.2", "1.1.0", "1.1.rc2", "1.1.pre4", "1.1.pre3", "1.1.pre", "1.0.11", "1.0.9", "1.0.8", "1.0.7", "1.0.4", "1.0.3", "1.0.2", "1.0.0", "0.9.2", "0.9.0", "0.8.1", "0.8.0", "0.7.5", "0.7.4", "0.7.3", "0.7.2", "0.7.0", "0.6.3", "0.6.2", "0.6.0", "0.5.6", "0.5.4", "0.5.3", "0.5.1", "0.4.3", "0.4.2", "0.3.0", "0.2.3", "0.2.1", "4.6.1", "4.5.0", "4.4.3", "4.4.2", "4.4.1", "4.4.0", "4.3.0", "4.2.1", "4.2.0", "4.1.1", "4.0.2", "4.0.0.rc2", "4.0.0.rc1", "3.5.10", "3.5.9", "3.5.6", "3.5.5", "3.5.4", "3.5.3", "3.2.3", "3.2.2", "3.2.1", "3.1.1", "3.1.0", "3.0.3", "3.0.1", "3.0.0", "3.0.0.rc", "2.2.7", "2.2.3", "2.2.1", "2.2.0", "2.2.0.rc", "2.1.3", "2.1.0.rc2", "2.0.6", "2.0.4", "2.0.2", "2.0.1", "2.0.0", "2.0.0.rc2", "1.5.3", "1.5.0.rc1", "1.4.9", "1.4.8", "1.4.5", "1.4.3", "1.4.1", "1.3.4", "1.3.3", "1.3.2", "1.3.1", "1.3.0", "1.2.1", "1.2.rc2", "1.1.9", "1.1.6", "1.1.5", "1.1.4", "1.1.1", "1.1.rc1", "1.1.rc0", "1.1.pre2", "1.0.10", "1.0.6", "1.0.5", "1.0.1", "0.9.1", "0.8.2", "0.7.1", "0.6.1", "0.5.5", "0.5.2", "0.5.0", "0.4.1", "0.4.0", "0.2.2", "0.2.0", "0.1.1", "0.1.0"]
Secure versions:
[4.7.1, 4.7.2, 4.7.3, 4.8.0, 4.8.1, 4.9.0, 4.9.1, 4.9.2, 4.9.3, 4.9.4]
Recommendation:
Update to version 4.9.4.
Published date: 2017-10-24T18:33:37Z
CVE: CVE-2013-0233
Devise gem 2.2.x before 2.2.3, 2.1.x before 2.1.3, 2.0.x before 2.0.5, and 1.5.x before 1.5.4 for Ruby, when using certain databases, does not properly perform type conversion when performing database queries, which might allow remote attackers to cause incorrect results to be returned and bypass security checks via unknown vectors, as demonstrated by resetting passwords of arbitrary accounts.
Affected versions:
["1.5.2", "1.5.1", "1.5.0", "1.5.3", "2.0.4", "2.0.2", "2.0.1", "2.0.0", "2.1.2", "2.1.0", "2.2.2", "2.2.1", "2.2.0"]
Secure versions:
[4.7.1, 4.7.2, 4.7.3, 4.8.0, 4.8.1, 4.9.0, 4.9.1, 4.9.2, 4.9.3, 4.9.4]
Recommendation:
Update to version 4.9.4.
Published date: 2016-01-18
CVE: 2015-8314
CVSS V3: 7.5
Devise version before 3.5.4 uses cookies to implement a Remember me
functionality. However, it generates the same cookie for all devices. If an
attacker manages to steal a remember me cookie and the user does not change
the password frequently, the cookie can be used to gain access to the
application indefinitely.
Affected versions:
["3.5.2", "3.5.1", "3.4.1", "3.4.0", "3.3.0", "3.2.4", "3.2.0", "3.1.2", "3.1.0.rc2", "3.0.4", "3.0.2", "2.2.8", "2.2.6", "2.2.5", "2.2.4", "2.2.2", "2.1.4", "2.1.2", "2.1.0", "2.1.0.rc", "2.0.5", "2.0.0.rc", "1.5.4", "1.5.2", "1.5.1", "1.5.0", "1.4.7", "1.4.2", "1.2.0", "1.2.rc", "1.1.8", "1.1.7", "1.1.3", "1.1.2", "1.1.0", "1.1.rc2", "1.1.pre4", "1.1.pre3", "1.1.pre", "1.0.11", "1.0.9", "1.0.8", "1.0.7", "1.0.4", "1.0.3", "1.0.2", "1.0.0", "0.9.2", "0.9.0", "0.8.1", "0.8.0", "0.7.5", "0.7.4", "0.7.3", "0.7.2", "0.7.0", "0.6.3", "0.6.2", "0.6.0", "0.5.6", "0.5.4", "0.5.3", "0.5.1", "0.4.3", "0.4.2", "0.3.0", "0.2.3", "0.2.1", "3.5.3", "3.2.3", "3.2.2", "3.2.1", "3.1.1", "3.1.0", "3.0.3", "3.0.1", "3.0.0", "3.0.0.rc", "2.2.7", "2.2.3", "2.2.1", "2.2.0", "2.2.0.rc", "2.1.3", "2.1.0.rc2", "2.0.6", "2.0.4", "2.0.2", "2.0.1", "2.0.0", "2.0.0.rc2", "1.5.3", "1.5.0.rc1", "1.4.9", "1.4.8", "1.4.5", "1.4.3", "1.4.1", "1.3.4", "1.3.3", "1.3.2", "1.3.1", "1.3.0", "1.2.1", "1.2.rc2", "1.1.9", "1.1.6", "1.1.5", "1.1.4", "1.1.1", "1.1.rc1", "1.1.rc0", "1.1.pre2", "1.0.10", "1.0.6", "1.0.5", "1.0.1", "0.9.1", "0.8.2", "0.7.1", "0.6.1", "0.5.5", "0.5.2", "0.5.0", "0.4.1", "0.4.0", "0.2.2", "0.2.0", "0.1.1", "0.1.0"]
Secure versions:
[4.7.1, 4.7.2, 4.7.3, 4.8.0, 4.8.1, 4.9.0, 4.9.1, 4.9.2, 4.9.3, 4.9.4]
Recommendation:
Update to version 4.9.4.
Published date: 2019-09-08
CVE: 2019-16109
CVSS V3: 5.3
Devise before 4.7.1 confirms accounts upon receiving a request with a blank
confirmationtoken, if a database record has a blank value in the confirmation token column.
However, there is no scenario within Devise itself in which such database records would exist.
Affected versions:
["4.7.0", "4.6.2", "4.6.0", "4.1.0", "4.0.3", "4.0.1", "4.0.0", "3.5.8", "3.5.7", "3.5.2", "3.5.1", "3.4.1", "3.4.0", "3.3.0", "3.2.4", "3.2.0", "3.1.2", "3.1.0.rc2", "3.0.4", "3.0.2", "2.2.8", "2.2.6", "2.2.5", "2.2.4", "2.2.2", "2.1.4", "2.1.2", "2.1.0", "2.1.0.rc", "2.0.5", "2.0.0.rc", "1.5.4", "1.5.2", "1.5.1", "1.5.0", "1.4.7", "1.4.2", "1.2.0", "1.2.rc", "1.1.8", "1.1.7", "1.1.3", "1.1.2", "1.1.0", "1.1.rc2", "1.1.pre4", "1.1.pre3", "1.1.pre", "1.0.11", "1.0.9", "1.0.8", "1.0.7", "1.0.4", "1.0.3", "1.0.2", "1.0.0", "0.9.2", "0.9.0", "0.8.1", "0.8.0", "0.7.5", "0.7.4", "0.7.3", "0.7.2", "0.7.0", "0.6.3", "0.6.2", "0.6.0", "0.5.6", "0.5.4", "0.5.3", "0.5.1", "0.4.3", "0.4.2", "0.3.0", "0.2.3", "0.2.1", "4.6.1", "4.5.0", "4.4.3", "4.4.2", "4.4.1", "4.4.0", "4.3.0", "4.2.1", "4.2.0", "4.1.1", "4.0.2", "4.0.0.rc2", "4.0.0.rc1", "3.5.10", "3.5.9", "3.5.6", "3.5.5", "3.5.4", "3.5.3", "3.2.3", "3.2.2", "3.2.1", "3.1.1", "3.1.0", "3.0.3", "3.0.1", "3.0.0", "3.0.0.rc", "2.2.7", "2.2.3", "2.2.1", "2.2.0", "2.2.0.rc", "2.1.3", "2.1.0.rc2", "2.0.6", "2.0.4", "2.0.2", "2.0.1", "2.0.0", "2.0.0.rc2", "1.5.3", "1.5.0.rc1", "1.4.9", "1.4.8", "1.4.5", "1.4.3", "1.4.1", "1.3.4", "1.3.3", "1.3.2", "1.3.1", "1.3.0", "1.2.1", "1.2.rc2", "1.1.9", "1.1.6", "1.1.5", "1.1.4", "1.1.1", "1.1.rc1", "1.1.rc0", "1.1.pre2", "1.0.10", "1.0.6", "1.0.5", "1.0.1", "0.9.1", "0.8.2", "0.7.1", "0.6.1", "0.5.5", "0.5.2", "0.5.0", "0.4.1", "0.4.0", "0.2.2", "0.2.0", "0.1.1", "0.1.0"]
Secure versions:
[4.7.1, 4.7.2, 4.7.3, 4.8.0, 4.8.1, 4.9.0, 4.9.1, 4.9.2, 4.9.3, 4.9.4]
Recommendation:
Update to version 4.9.4.
Published date: 2019-02-07
CVE: 2019-5421
CVSS V2: 7.5
CVSS V3: 9.8
Devise ruby gem before 4.6.0 when the lockable
module is used is vulnerable to a
time-of-check time-of-use (TOCTOU) race condition due to increment_failed_attempts
within the Devise::Models::Lockable
class not being concurrency safe.
Affected versions:
["4.1.0", "4.0.3", "4.0.1", "4.0.0", "3.5.8", "3.5.7", "3.5.2", "3.5.1", "3.4.1", "3.4.0", "3.3.0", "3.2.4", "3.2.0", "3.1.2", "3.1.0.rc2", "3.0.4", "3.0.2", "2.2.8", "2.2.6", "2.2.5", "2.2.4", "2.2.2", "2.1.4", "2.1.2", "2.1.0", "2.1.0.rc", "2.0.5", "2.0.0.rc", "1.5.4", "1.5.2", "1.5.1", "1.5.0", "1.4.7", "1.4.2", "1.2.0", "1.2.rc", "1.1.8", "1.1.7", "1.1.3", "1.1.2", "1.1.0", "1.1.rc2", "1.1.pre4", "1.1.pre3", "1.1.pre", "1.0.11", "1.0.9", "1.0.8", "1.0.7", "1.0.4", "1.0.3", "1.0.2", "1.0.0", "0.9.2", "0.9.0", "0.8.1", "0.8.0", "0.7.5", "0.7.4", "0.7.3", "0.7.2", "0.7.0", "0.6.3", "0.6.2", "0.6.0", "0.5.6", "0.5.4", "0.5.3", "0.5.1", "0.4.3", "0.4.2", "0.3.0", "0.2.3", "0.2.1", "4.5.0", "4.4.3", "4.4.2", "4.4.1", "4.4.0", "4.3.0", "4.2.1", "4.2.0", "4.1.1", "4.0.2", "4.0.0.rc2", "4.0.0.rc1", "3.5.10", "3.5.9", "3.5.6", "3.5.5", "3.5.4", "3.5.3", "3.2.3", "3.2.2", "3.2.1", "3.1.1", "3.1.0", "3.0.3", "3.0.1", "3.0.0", "3.0.0.rc", "2.2.7", "2.2.3", "2.2.1", "2.2.0", "2.2.0.rc", "2.1.3", "2.1.0.rc2", "2.0.6", "2.0.4", "2.0.2", "2.0.1", "2.0.0", "2.0.0.rc2", "1.5.3", "1.5.0.rc1", "1.4.9", "1.4.8", "1.4.5", "1.4.3", "1.4.1", "1.3.4", "1.3.3", "1.3.2", "1.3.1", "1.3.0", "1.2.1", "1.2.rc2", "1.1.9", "1.1.6", "1.1.5", "1.1.4", "1.1.1", "1.1.rc1", "1.1.rc0", "1.1.pre2", "1.0.10", "1.0.6", "1.0.5", "1.0.1", "0.9.1", "0.8.2", "0.7.1", "0.6.1", "0.5.5", "0.5.2", "0.5.0", "0.4.1", "0.4.0", "0.2.2", "0.2.0", "0.1.1", "0.1.0"]
Secure versions:
[4.7.1, 4.7.2, 4.7.3, 4.8.0, 4.8.1, 4.9.0, 4.9.1, 4.9.2, 4.9.3, 4.9.4]
Recommendation:
Update to version 4.9.4.
Published date: 2013-08-02
Devise contains a flaw that allows a remote, user-assisted attacker to
conduct a CSRF token fixation attack. This issue is triggered as previous
CSRF tokens are not properly invalidated when a new token is created.
If an attacker has knowledge of said token, a specially crafted request can
be made to it, allowing the attacker to conduct CSRF attacks.
Affected versions:
["2.1.4", "2.1.2", "2.1.0", "2.1.0.rc", "2.0.5", "2.0.0.rc", "1.5.4", "1.5.2", "1.5.1", "1.5.0", "1.4.7", "1.4.2", "1.2.0", "1.2.rc", "1.1.8", "1.1.7", "1.1.3", "1.1.2", "1.1.0", "1.1.rc2", "1.1.pre4", "1.1.pre3", "1.1.pre", "1.0.11", "1.0.9", "1.0.8", "1.0.7", "1.0.4", "1.0.3", "1.0.2", "1.0.0", "0.9.2", "0.9.0", "0.8.1", "0.8.0", "0.7.5", "0.7.4", "0.7.3", "0.7.2", "0.7.0", "0.6.3", "0.6.2", "0.6.0", "0.5.6", "0.5.4", "0.5.3", "0.5.1", "0.4.3", "0.4.2", "0.3.0", "0.2.3", "0.2.1", "3.0.0", "3.0.0.rc", "2.1.3", "2.1.0.rc2", "2.0.6", "2.0.4", "2.0.2", "2.0.1", "2.0.0", "2.0.0.rc2", "1.5.3", "1.5.0.rc1", "1.4.9", "1.4.8", "1.4.5", "1.4.3", "1.4.1", "1.3.4", "1.3.3", "1.3.2", "1.3.1", "1.3.0", "1.2.1", "1.2.rc2", "1.1.9", "1.1.6", "1.1.5", "1.1.4", "1.1.1", "1.1.rc1", "1.1.rc0", "1.1.pre2", "1.0.10", "1.0.6", "1.0.5", "1.0.1", "0.9.1", "0.8.2", "0.7.1", "0.6.1", "0.5.5", "0.5.2", "0.5.0", "0.4.1", "0.4.0", "0.2.2", "0.2.0", "0.1.1", "0.1.0"]
Secure versions:
[4.7.1, 4.7.2, 4.7.3, 4.8.0, 4.8.1, 4.9.0, 4.9.1, 4.9.2, 4.9.3, 4.9.4]
Recommendation:
Update to version 4.9.4.
167 Other Versions