Search for vulnerabilities
| Vulnerability ID | VCID-cdnw-t8n1-23ep |
| Aliases |
CVE-2011-3187
GHSA-3vfw-7rcp-3xgm |
| Summary | Improper Input Validation The to_s method in actionpack/lib/action_dispatch/middleware/remote_ip.rb in Ruby on Rails 3.0.5 does not validate the X-Forwarded-For header in requests from IP addresses on a Class C network, which might allow remote attackers to inject arbitrary text into log files or bypass intended address parsing via a crafted header. |
| Status | Published |
| Exploitability | 2.0 |
| Weighted Severity | 6.2 |
| Risk | 10.0 |
| Affected and Fixed Packages | Package Details |
| Data source | Exploit-DB |
|---|---|
| Date added | Feb. 16, 2011 |
| Description | Ruby on Rails 3.0.5 - 'WEBrick::HTTPRequest' Module HTTP Header Injection |
| Ransomware campaign use | Known |
| Source publication date | Feb. 16, 2011 |
| Exploit type | remote |
| Platform | multiple |
| Source update date | Nov. 24, 2014 |
| Source URL | https://www.securityfocus.com/bid/46423/info |
| Percentile | 0.92606 |
| EPSS Score | 0.09049 |
| Published At | April 1, 2026, 12:55 p.m. |
| Date | Actor | Action | Source | VulnerableCode Version |
|---|---|---|---|---|
| 2026-04-01T12:47:25.613368+00:00 | GitLab Importer | Import | https://gitlab.com/gitlab-org/advisories-community/-/blob/main/gem/actionpack/CVE-2011-3187.yml | 38.0.0 |