CVE-2017-0905

The Recurly Client Ruby Library before 2.0.13, 2.1.11, 2.2.5, 2.3.10, 2.4.11, 2.5.4, 2.6.3, 2.7.8, 2.8.2, 2.9.2, 2.10.4, 2.11.3 is vulnerable to a Server-Side Request Forgery vulnerability in the "Resource#find" method that could result in compromise of API keys or other critical resources.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:recurly:recurly_client_ruby:2.0.0:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.0.1:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.0.3:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.0.4:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.0.5:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.0.6:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.0.7:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.0.8:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.0.9:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.0.10:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.0.11:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.0.12:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:recurly:recurly_client_ruby:2.1.0:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.1.0:c:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.1.1:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.1.2:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.1.4:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.1.5:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.1.6:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.1.7:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.1.8:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.1.9:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.1.10:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:recurly:recurly_client_ruby:2.2.0:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.2.4:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:a:recurly:recurly_client_ruby:2.3.0:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.3.0:beta1:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.3.1:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.3.2:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.3.3:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.3.4:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.3.5:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.3.6:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.3.7:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.3.8:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.3.9:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:a:recurly:recurly_client_ruby:2.4.0:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.4.1:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.4.2:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.4.3:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.4.4:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.4.5:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.4.6:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.4.7:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.4.8:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.4.9:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.4.10:*:*:*:*:*:*:*

Configuration 6 (hide)

OR cpe:2.3:a:recurly:recurly_client_ruby:2.5.0:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.5.1:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.5.2:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.5.3:*:*:*:*:*:*:*

Configuration 7 (hide)

OR cpe:2.3:a:recurly:recurly_client_ruby:2.6.0:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.6.1:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.6.2:*:*:*:*:*:*:*

Configuration 8 (hide)

OR cpe:2.3:a:recurly:recurly_client_ruby:2.7.0:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.7.1:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.7.2:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.7.3:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.7.4:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.7.5:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.7.6:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.7.7:*:*:*:*:*:*:*

Configuration 9 (hide)

OR cpe:2.3:a:recurly:recurly_client_ruby:2.8.0:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.8.0:rc1:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.8.0:rc3:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.8.1:*:*:*:*:*:*:*

Configuration 10 (hide)

OR cpe:2.3:a:recurly:recurly_client_ruby:2.9.0:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.9.1:*:*:*:*:*:*:*

Configuration 11 (hide)

OR cpe:2.3:a:recurly:recurly_client_ruby:2.10.0:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.10.1:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.10.2:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.10.3:*:*:*:*:*:*:*

Configuration 12 (hide)

OR cpe:2.3:a:recurly:recurly_client_ruby:2.11.0:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.11.1:*:*:*:*:*:*:*
cpe:2.3:a:recurly:recurly_client_ruby:2.11.2:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-11-13 17:29

Updated : 2023-12-10 12:15


NVD link : CVE-2017-0905

Mitre link : CVE-2017-0905

CVE.ORG link : CVE-2017-0905


JSON object : View

Products Affected

recurly

  • recurly_client_ruby
CWE
CWE-918

Server-Side Request Forgery (SSRF)