Lucene search

K
githubGitHub Advisory DatabaseGHSA-XC85-32MF-XPV8
HistoryMay 05, 2022 - 2:48 a.m.

Rack arbitrary code execution via timing attack

2022-05-0502:48:42
GitHub Advisory Database
github.com
20
rack
session cookie
arbitrary code execution
timing attack
software update

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

EPSS

0.084

Percentile

94.4%

Rack::Session::Cookie in Rack 1.5.x before 1.5.2, 1.4.x before 1.4.5, 1.3.x before 1.3.10, 1.2.x before 1.2.8, and 1.1.x before 1.1.6 allows remote attackers to guess the session cookie, gain privileges, and execute arbitrary code via a timing attack involving an HMAC comparison function that does not run in constant time.

Affected configurations

Vulners
Node
rackrackRange1.1.01.1.6
OR
rackrackRange1.2.01.2.8
OR
rackrackRange1.3.01.3.10
OR
rackrackRange1.4.01.4.5
OR
rackrackRange1.5.01.5.2
VendorProductVersionCPE
rackrack*cpe:2.3:a:rack:rack:*:*:*:*:*:*:*:*

CVSS2

5.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:H/Au:N/C:P/I:P/A:P

EPSS

0.084

Percentile

94.4%