field_test 0.3.0
CSRF Vulnerability with Non-Session Based Authentication
medium severity CVE-2020-16252>= 0.4.0
< 0.2.0
The Field Test dashboard is vulnerable to CSRF with non-session based authentication methods.
Impact
The Field Test dashboard is vulnerable to CSRF with non-session based authentication methods, like basic authentication. Session-based authentication methods (like Devise's default authentication) are not affected.
A CSRF attack works by getting an authorized user to visit a malicious website and then performing requests on behalf of the user. In this instance, a single endpoint is affected, which allows for changing the variant assigned to a user.
Arbitrary Variants Via Query Parameters
medium severity CVE-2019-13146>= 0.3.1
< 0.3.0
Due to unvalidated input, an attacker can pass in arbitrary variants via query parameters.
If an application treats variants as trusted, this can lead to potential vulnerabilities like SQL injection or cross-site scripting (XSS). For instance:
landing_page = field_test(:landing_page) Page.where("key = '#{landing_page}'")
No officially reported memory leakage issues detected.
This gem version does not have any officially reported memory leaked issues.
No license issues detected.
This gem version has a license in the gemspec.
This gem version is available.
This gem version has not been yanked and is still available for usage.