-
CVSS Score
-The vulnerability stems from the membership update endpoint honoring the 'membership[entity_id]' parameter without validation. In Rails applications, controller actions handling parameters typically use strong parameters. The described attack requires the controller to permit and process entity_id from requests, which should have been excluded from mass assignment. The linked PR #1862 mentions security fixes for membership updates, suggesting the controller's parameter handling was improperly allowing entity_id modification. The endpoint path (/admin/users/{user_id}/memberships/{membership_id}) maps to a standard Rails update action pattern, making Admin::MembershipsController#update the most likely vulnerable function.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| pageflow | rubygems | < 14.5.2 | 14.5.2 |
| pageflow | rubygems | >= 15.0.0, < 15.7.1 | 15.7.1 |