Lucene search

K
rubygemsRubySecRUBY:RAILS-2007-6077
HistoryOct 23, 2017 - 9:00 p.m.

Moderate severity vulnerability that affects rails

2017-10-2321:00:00
RubySec
rubysec.com
14

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.028 Low

EPSS

Percentile

90.7%

The session fixation protection mechanism in cgi_process.rb in
Rails 1.2.4, as used in Ruby on Rails, removes the :cookie_only
attribute from the DEFAULT_SESSION_OPTIONS constant, which
effectively causes cookie_only to be applied only to the first
instantiation of CgiRequest, which allows remote attackers to
conduct session fixation attacks.

NOTE: this is due to an incomplete fix for CVE-2007-5380.

CPENameOperatorVersion
railslt1.2.6

6.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.028 Low

EPSS

Percentile

90.7%