devise 0.8.0
Devise Gem for Ruby Time-of-check Time-of-use race condition with lockable module
critical severity CVE-2019-5421>= 4.6.0
Devise ruby gem before 4.6.0 when the lockable
module is used is vulnerable to a
time-of-check time-of-use (TOCTOU) race condition due to increment_failed_attempts
within the Devise::Models::Lockable
class not being concurrency safe.
CSRF token fixation attacks in Devise
high severity OSVDB-114435~> 2.2.5
, >= 3.0.1
Devise contains a flaw that allows a remote, user-assisted attacker to conduct a CSRF token fixation attack. This issue is triggered as previous CSRF tokens are not properly invalidated when a new token is created. If an attacker has knowledge of said token, a specially crafted request can be made to it, allowing the attacker to conduct CSRF attacks.
Devise Gem for Ruby Unauthorized Access Using Remember Me Cookie
high severity CVE-2015-8314>= 3.5.4
Devise version before 3.5.4 uses cookies to implement a "Remember me" functionality. However, it generates the same cookie for all devices. If an attacker manages to steal a remember me cookie and the user does not change the password frequently, the cookie can be used to gain access to the application indefinitely.
Devise Database Type Conversion Crafted Request Parsing Security Bypass
high severity CVE-2013-0233~> 1.5.4
, ~> 2.0.5
, ~> 2.1.3
, >= 2.2.3
Devise contains a flaw that is triggered during when a type conversion error occurs during the parsing of a malformed request. With a specially crafted request, a remote attacker can bypass security restrictions.
Devise Gem for Ruby confirmation token validation with a blank string
medium severity CVE-2019-16109>= 4.7.1
Devise before 4.7.1 confirms accounts upon receiving a request with a blank confirmation_token, if a database record has a blank value in the confirmation_token column. However, there is no scenario within Devise itself in which such database records would exist.
No officially reported memory leakage issues detected.
This gem version does not have any officially reported memory leaked issues.
Gem version without a license.
Unless a license that specifies otherwise is included, nobody can use, copy, distribute, or modify this library without being at risk of take-downs, shake-downs, or litigation.
This gem version is available.
This gem version has not been yanked and is still available for usage.