CVE-2025-58067

4.2 MEDIUM

📋 TL;DR

This vulnerability in Basecamp's google_sign_in gem allows open redirect attacks when using Google Sign-In in Rails applications. Attackers could redirect users to malicious sites by manipulating the 'proceed_to' session parameter. All Rails applications using vulnerable versions of the google_sign_in gem are affected.

💻 Affected Systems

Products:
  • Basecamp google_sign_in gem
Versions: All versions prior to 1.3.1
Operating Systems: Any OS running Ruby on Rails applications
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Rails applications using the google_sign_in gem for Google authentication.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Users could be redirected to phishing sites that steal credentials or deliver malware, potentially leading to account compromise and data theft.

🟠

Likely Case

Users redirected to malicious sites for phishing, credential harvesting, or malware distribution.

🟢

If Mitigated

Limited impact with proper user awareness training and browser security controls, but still represents a security flaw.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Requires chaining with another attack to modify OAuth2 parameters, but the redirect itself can be triggered by unauthenticated users.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.3.1

Vendor Advisory: https://github.com/basecamp/google_sign_in/security/advisories/GHSA-5jch-xhw4-r43v

Restart Required: Yes

Instructions:

1. Update Gemfile to 'gem "google_sign_in", "~> 1.3.1"' 2. Run 'bundle update google_sign_in' 3. Restart Rails application server

🔧 Temporary Workarounds

No workarounds available

all

The vendor advisory states there are no workarounds for this vulnerability.

🧯 If You Can't Patch

  • Implement additional validation in application code to verify redirect URLs before processing
  • Monitor for suspicious redirect patterns in application logs and implement rate limiting

🔍 How to Verify

Check if Vulnerable:

Check Gemfile.lock for google_sign_in version: grep 'google_sign_in' Gemfile.lock

Check Version:

bundle show google_sign_in | grep -o '[0-9]\+\.[0-9]\+\.[0-9]\+'

Verify Fix Applied:

Verify version 1.3.1 or higher is installed: bundle show google_sign_in

📡 Detection & Monitoring

Log Indicators:

  • Unusual redirect patterns in authentication logs
  • Multiple failed authentication attempts with modified parameters

Network Indicators:

  • Unexpected redirects to external domains during OAuth flow

SIEM Query:

source="rails_app" AND (event="redirect" OR event="authentication") AND url CONTAINS "//" AND NOT url STARTSWITH "https://"

🔗 References

📤 Share & Export