devise 1.5.3

5 security vulnerabilities found in version 1.5.3

Devise Gem for Ruby Time-of-check Time-of-use race condition with lockable module

critical severity CVE-2019-5421
critical severity CVE-2019-5421
Patched versions: >= 4.6.0

Devise ruby gem before 4.6.0 when the lockable module is used is vulnerable to a time-of-check time-of-use (TOCTOU) race condition due to increment_failed_attempts within the Devise::Models::Lockable class not being concurrency safe.

CSRF token fixation attacks in Devise

high severity OSVDB-114435
high severity OSVDB-114435
Patched versions: ~> 2.2.5, >= 3.0.1

Devise contains a flaw that allows a remote, user-assisted attacker to conduct a CSRF token fixation attack. This issue is triggered as previous CSRF tokens are not properly invalidated when a new token is created. If an attacker has knowledge of said token, a specially crafted request can be made to it, allowing the attacker to conduct CSRF attacks.

Devise Gem for Ruby Unauthorized Access Using Remember Me Cookie

high severity CVE-2015-8314
high severity CVE-2015-8314
Patched versions: >= 3.5.4

Devise version before 3.5.4 uses cookies to implement a "Remember me" functionality. However, it generates the same cookie for all devices. If an attacker manages to steal a remember me cookie and the user does not change the password frequently, the cookie can be used to gain access to the application indefinitely.

Devise Database Type Conversion Crafted Request Parsing Security Bypass

high severity CVE-2013-0233
high severity CVE-2013-0233
Patched versions: ~> 1.5.4, ~> 2.0.5, ~> 2.1.3, >= 2.2.3

Devise contains a flaw that is triggered during when a type conversion error occurs during the parsing of a malformed request. With a specially crafted request, a remote attacker can bypass security restrictions.

Devise Gem for Ruby confirmation token validation with a blank string

medium severity CVE-2019-16109
medium severity CVE-2019-16109
Patched versions: >= 4.7.1

Devise before 4.7.1 confirms accounts upon receiving a request with a blank confirmation_token, if a database record has a blank value in the confirmation_token column. However, there is no scenario within Devise itself in which such database records would exist.

No officially reported memory leakage issues detected.


This gem version does not have any officially reported memory leaked issues.

Author did not declare license for this gem in the gemspec.


This gem version has a MIT license in the source code, however it was not declared in the gemspec file.

This gem version is available.


This gem version has not been yanked and is still available for usage.