CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
66.0%
The devise_masquerade gem before 1.3 allows certain attacks when a password’s
salt is unknown. An application that uses this gem to let administrators masquerade/impersonate
users loses one layer of security protection compared to a situation where Devise
(without this extension) is used. If the server-side secret_key_base value became
publicly known (for instance if it is committed to a public repository by mistake),
there are still other protections in place that prevent an attacker from impersonating
any user on the site. When masquerading is not used in a plain Devise application,
one must know the password salt of the target user if one wants to encrypt and sign
a valid session cookie. When devise_masquerade is used, however, an attacker can
decide which user the “back” action will go back to without knowing that user’s
password salt and simply knowing the user ID, by manipulating the session cookie
and pretending that a user is already masqueraded by an administrator.
Vendor | Product | Version | CPE |
---|---|---|---|
ruby | devise_masquerade | * | cpe:2.3:a:ruby:devise_masquerade:*:*:*:*:*:*:*:* |
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS
Percentile
66.0%