5.8 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N
5.7 Medium
AI Score
Confidence
High
0.008 Low
EPSS
Percentile
81.5%
In RubyGem excon before 0.71.0, there was a race condition around persistent connections, where a connection which is interrupted (such as by a timeout) would leave data on the socket. Subsequent requests would then read this data, returning content from the previous response. The race condition window appears to be short, and it would be difficult to purposefully exploit this.
[
{
"product": "excon",
"vendor": "excon",
"versions": [
{
"lessThan": "0.71.0",
"status": "affected",
"version": "< 0.71.0",
"versionType": "custom"
}
]
}
]
lists.opensuse.org/opensuse-security-announce/2020-01/msg00021.html
lists.opensuse.org/opensuse-security-announce/2020-01/msg00062.html
github.com/excon/excon/commit/ccb57d7a422f020dc74f1de4e8fb505ab46d8a29
github.com/excon/excon/security/advisories/GHSA-q58g-455p-8vw9
lists.debian.org/debian-lts-announce/2020/01/msg00015.html
5.8 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:N/A:N
5.7 Medium
AI Score
Confidence
High
0.008 Low
EPSS
Percentile
81.5%